Software

With virtualization, mobile apps, and agile dev platforms, software increasingly defines business. Take advantage of our expert guidance for developing, managing, and monetizing software.

  • Hyper-Convergence Extended Beyond the Hype: to the Branch

    Webcasts // Feb 2016 // provided by Riverbed

    Listen to our on-demand webcast featuring Riverbed SteelFusion customer Michael Rinken, Director of Corporate IT, Mazzetti, and Riverbed experts to get the facts about this remarkable new technology and find out what it can do for your organization. On this webcast, you will learn how you can: Reduce Company ...

    Watch Now
  • Houston, we have a problem!

    Webcasts // Feb 2016 // provided by IBM

    In today’s 24/7 “on-line all the time” world where there is an app for everything, how do you keep all your systems running? How quickly can you react to unexpected system performance degradation? Can you monitor specific applications in production environments and pro-actively uncover/prevent the next big crisis? How do ...

    Watch Now
  • Exercising the C-Suite: Gain IR Muscle

    Webcasts // Jan 2016 // provided by FireEye

    In this webinar, Mandiant Principal Consultant Matt Shaffer will examine how organizations involve their C-Suite in simulations and game activities to build awareness of best practices and common pitfalls. Join this webinar to learn how you can fully engage your C-suite and improve your organization’s security posture.

    Watch Now
  • Top 10 Security Predictions for 2016

    Webcasts // Jan 2016 // provided by FireEye

    It’s been a year of more-more cyber attacks in more industries. And health care has emerged as the target of the year, affecting the lives of millions of customers and employees. 2015 has also been the year of international cyber treaties to help curb attacks. What will the new ...

    Watch Now
  • You’ve been hacked. Now what?

    Webcasts // Dec 2015 // provided by FireEye

    A network breach is not a matter of if, but when. However many companies are still a long way from having a network security posture to effectively manage or respond to today’s evolving cyber threats. Having security systems in place within your network architecture is only half the battle; todays ...

    Watch Now
  • Uponor case study package: On the road to marketing maturity with the Sitecore® Experience Platform™

    Webcasts // Nov 2015 // provided by Sitecore

    Rapid technology disruptions, high customer demands, and gaps in staff skills to address both, are some of the crucial challenges most digital marketers face today. With so much energy going toward these in-the-moment needs, it can be easy to lose sight of your future plans, much less any sense of ...

    Watch Now
  • Rowhammer.js: Root Privileges for Web Apps?

    Webcasts // Jan 2016 // provided by SecurityTube.net

    In this webcast, the presenters present Rowhammer.js, a JavaScript-based implementation of the Rowhammer attack. After presenting the native attack, they underline the challenges they faced to trigger the vulnerability from JavaScript, without any special instruction. Beyond DRAM, this attack also requires a very fine understanding of CPU cache internals that ...

    Watch Now
  • The Ling Language: Modular and Precise Resource Management

    Webcasts // Dec 2015 // provided by SecurityTube.net

    In this webcast, the presenter will present the experimental language Ling. The presenter shall get an intuitive understanding of the language through familiar concepts from imperative programming. The presenter shall cover how Ling enables a modular and precise control on memory allocation, through a general optimization called fusion.

    Watch Now
  • Penetration Testing with Raspberry Pi

    Webcasts // Dec 2015 // provided by SecurityTube.net

    The Raspberry Pi is a $35 computer that can be used for small computing tasks and education purposes. However it can also be used as a penetration testing platform that allows for social engineering, advanced attacks and other forms of evil. In this webcast, the presenter will cover how the ...

    Watch Now
  • How Machine Learning Finds Malware Needles in an AppStore Haystack

    Webcasts // Dec 2015 // provided by SecurityTube.net

    Machine learning techniques are becoming more sophisticated. This webcast will include a live demo showing data analysis techniques and the results machine learning delivers in terms of classifying mobile applications with malicious or risky behavior. In this webcast, the presenter will also explain the difference between supervised and unsupervised algorithms ...

    Watch Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?