Software Research
-
MicroScope January 2014: A special issue looking at software defined networking
Sponsored by: TechTarget SecurityThe first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
-
The Role of Software-Defined Networks in Cloud Computing
Sponsored by: TechTarget SecurityThis expert guide breaks down the role of software-defined networks on a cloud computing environment.
-
How to implement virtualization on a budget
Sponsored by: HPE and Intel®Access this exclusive resource to find out how the combination of HP's converged infrastructure and Red Hat's virtualization software create the perfect platform for consolidating your Linux systems.
-
Fastest Path to Virtualization
Sponsored by: HPE and Intel®Explore this resource to find out how HP's ConvergedSystem for Virtualization can drive faster time-to-value while providing the scalability you need.
-
Reduce data center complexity when you 'go virtual'
Sponsored by: HPE and Intel®Access this exclusive, in-depth resource to find out how HP's latest solution for virtual environments can benefit your organization.
-
Reduce Costs and Stay Compliant With Next-Generation SAM
Sponsored by: CDW CorporationWatch this webcast to learn how to reduce the costs of software management by optimizing maintenance and operations.
-
Strategies to Survive Software Asset Management Audits
Sponsored by: CDW CorporationThis exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
-
HP Server Automation Virtual Appliance
Sponsored by: Hewlett Packard EnterpriseRead this exclusive white paper to find out the key features of HP's latest server automation software.
-
Trust in Cyberspace
Sponsored by: (ISC)2 UK LtdIn this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
-
Assuring Software Security Through Testing
Sponsored by: (ISC)2 UK LtdThis white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
-
Acronis Backup & Recovery® 11.5 Virtual Edition for Hyper-V®
Sponsored by: AcronisCheck out this exclusive white paper to find out the ins and outs of Acronis Backup and Recovery 11.5 Virtual Edition for Hyper-V, and how it will provide top-notch protection for your Hyper-V environment.
-
Plan for Success when Migrating from GroupWise to Office 365
Sponsored by: Dell SoftwareTake a look at this exclusive white paper to find out how you can utilize key factors of migration from GroupWise to Office 365, to propel yourself through a successful transition process.
-
How TCO Benefits Make Cloud Computing a No-Brainer for Many SMBs and Mid-Market Enterprises
Sponsored by: NetSuiteThis resource analyzes the economic benefits of cloud computing in the ERP and CRM space, and details how embracing the cloud can be a competitive differentiator for SMBs.
-
2013 North American Software Defined Data Center Management Platforms New Product Innovation Award
Sponsored by: HPE and Intel®Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.
-
10 Ways You Can Improve Web App Performance
Sponsored by: SOASTA, IncThis resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
-
Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
Sponsored by: Symantec CorporationDisasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.
-
Challenging Some of the Myths About Static Code Analysis
Sponsored by: KlocworkThis paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
-
Defend Against Injection-based Attacks
Sponsored by: KlocworkThis paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
-
Cloud Based Application Penetration Testing Trial
Sponsored by: iViZInside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
-
Dynamic Business - From Aspiration to Reality
Sponsored by: Microsoft IndiaThis resource examines how you can make your organization a dynamic business with the right set of innovative and proactive applications and tools.
-
Securing and Controlling Sensitive Data in the Cloud
Sponsored by: Trend MicroThis white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
-
Computer Weekly – 10 December 2013: The most influential people in UK IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and also select 10 rising stars to look out for in 2014. We look back at the big changes in the datacentre environment this year. And we examine the growing popularity of agile development. Read the issue now.
-
Computer Weekly – 3 December 2013: The future of local government IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at how visionary IT leaders in local government plan to transform the delivery of digital public services. Our latest buyer's guide looks at the technology challenges of the internet of things. And do businesses dealing with tech-savvy consumers need a new approach to IT management? Read the issue now.
-
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
Sponsored by: Imperva.This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
-
Computer Weekly – 26 November 2013: Embracing wearable technology
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to the London researchers developing multi-sensory communications via wearable mobile devices. We report from the Gartner Symposium on how CIOs are turning away from traditional IT suppliers. And we look at the role of the IT leader in 2020. Read the issue now.