Software

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Packaged Software, Application Programs, COTS Software, Downloadable Software, Application Software, Functional Programs, Application Program, Applications, Programs, Computer Programs, Software Packages, Software Applications, Computer Software, Software Programs, Commercial Off the Shelf Software, Off the Shelf Software
DEFINITION: Software is a general term for the various kinds of programs used to operate computers and related devices. (The term hardware describes the physical aspects of computers and related devices.)Software can be thought of as the variable part of a computer and hardware the invariable part. Software is often divided into application software (programs that do work users are directly interested in) and  … 
Definition continues below.
SoftwareReports
176 - 200 of 518 Matches Previous Page  | Next Page
Accelerate Disaster Recovery & Optimize Storage with Modernized Disaster Recovery Software
sponsored by CommVault
VIRTUAL ENVIRONMENT: Watch this informative webcast to find out the key features of this modernized disaster recovery software.
Posted: 12 Feb 2014 | Premiered: 08 Oct 2013

CommVault

CW Special Report on CA Technologies
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 9 page special independent report from Computer Weekly, updated for 2014, gives you the facts on CA, its strategy, products and services and financial performance.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

ComputerWeekly.com

The Total Economic Impact Of A Nexenta-Based Storage Solution
sponsored by Nexenta
CASE STUDY: Read this case study to find out the potential financial impact Nextenta-based storage solutions could have on your organization.
Posted: 04 Feb 2014 | Published: 31 Dec 2013

Nexenta

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

MicroScope January 2014: A special issue looking at software defined networking
sponsored by SearchSecurity.com
EZINE: The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres
Posted: 15 Jan 2014 | Published: 16 Jan 2014

SearchSecurity.com

Introducing Red Hat CloudForms 3.0
sponsored by Red Hat
WEBCAST: Did you know that the number one challenge people face when making the shift to cloud is management? Take a look at this brief webcast to learn about the software that will help you organization management.
Posted: 05 Dec 2013 | Premiered: Nov 5, 2013

Red Hat

The Role of Software-Defined Networks in Cloud Computing
sponsored by SearchSecurity.com
EGUIDE: This expert guide breaks down the role of software-defined networks on a cloud computing environment.
Posted: 21 Nov 2013 | Published: 21 Nov 2013

SearchSecurity.com

Storage Management FAQ and Software Buying Checklist
sponsored by IBM
WEBCAST: Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
Posted: 20 Nov 2013 | Premiered: Jul 16, 2012

IBM

Computer Weekly – 19 November 2013: Software-defined networking explodes
sponsored by SearchSecurity.com
EZINE: In this week's Computer Weekly, we look at the fast-growing trend for software-defined networking, and how startups are shaking up the established suppliers. We examine the new guidelines for using bring your own device schemes in the public sector. And we find out how second-user software could save money on licensing. Read the issue now.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

SearchSecurity.com

Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

2013 North American Software Defined Data Center Management Platforms New Product Innovation Award
sponsored by HP and Intel
RESEARCH CONTENT: Take a look at this in-depth resource to find out why HP received a "New Product Innovation Award" for their software defined data center management platforms.
Posted: 06 Feb 2014 | Published: 31 Dec 2013

HP and Intel

Join SafeNet Authentication Free Trial
sponsored by SafeNet Asia Ltd
TRIAL SOFTWARE: Experience low-maintenance and low-cost authorization controls by downloading your free 30-day trial of SafeNet Authentication Service, a cloud-based solution featuring token and self-service capabilities.
Posted: 10 Jan 2014 | Premiered: 10 Jan 2014

SafeNet Asia Ltd

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
sponsored by Symantec Corporation
WHITE PAPER: Disasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Symantec Corporation

Defend Against Injection-based Attacks
sponsored by Klocwork
WHITE PAPER: This paper provides a detailed description of injection vulnerabilities, discusses how they present themselves to both end users and software developers, and explains mitigation strategies to help resolve the various types of injection attacks.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Klocwork

Challenging Some of the Myths About Static Code Analysis
sponsored by Klocwork
WHITE PAPER: This paper addresses common myths surrounding static code analysis and explains what the technology can do for developers and the software development lifecycle.
Posted: 27 Dec 2013 | Published: 30 Nov 2013

Klocwork

Cloud Based Application Penetration Testing Trial
sponsored by iViZ
WHITE PAPER: Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

iViZ

Dynamic Business - From Aspiration to Reality
sponsored by Microsoft India
WHITE PAPER: This resource examines how you can make your organization a dynamic business with the right set of innovative and proactive applications and tools.
Posted: 19 Dec 2013 | Published: 19 Mar 2013

Microsoft India

Securing and Controlling Sensitive Data in the Cloud
sponsored by Trend Micro
WHITE PAPER: This white paper highlights a cloud security management solution that offers visibility into who is accessing encrypted data in your environments, enabling you to ensure data security and regulatory compliance.
Posted: 17 Dec 2013 | Published: 31 Dec 2012

Trend Micro

Computer Weekly – 10 December 2013: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 50 most influential people in UK IT, and also select 10 rising stars to look out for in 2014. We look back at the big changes in the datacentre environment this year. And we examine the growing popularity of agile development. Read the issue now.
Posted: 09 Dec 2013 | Published: 10 Dec 2013

ComputerWeekly.com

Computer Weekly – 3 December 2013: The future of local government IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at how visionary IT leaders in local government plan to transform the delivery of digital public services. Our latest buyer's guide looks at the technology challenges of the internet of things. And do businesses dealing with tech-savvy consumers need a new approach to IT management? Read the issue now.
Posted: 02 Dec 2013 | Published: 03 Dec 2013

ComputerWeekly.com

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Computer Weekly – 26 November 2013: Embracing wearable technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the London researchers developing multi-sensory communications via wearable mobile devices. We report from the Gartner Symposium on how CIOs are turning away from traditional IT suppliers. And we look at the role of the IT leader in 2020. Read the issue now.
Posted: 25 Nov 2013 | Published: 26 Nov 2013

ComputerWeekly.com

How software-defined infrastructure shapes compute resources
sponsored by VMware, Inc.
EGUIDE: This expert e-guide details the impact a software-defined data center will have on your computing resources.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

VMware, Inc.

Open Grid Europe is open to new approaches for IT training
sponsored by Hewlett-Packard Limited
CASE STUDY: In this brief case study, learn how Open Grid Europe leveraged e-learning software that enabled rapid and flexible creation of electronic, interactive manuals and software documentation for their employees. Discover the benefits Open Grid experiences thanks to this e-learning program and their new ALM software by reading now.
Posted: 12 Nov 2013 | Published: 30 Nov 2012

Hewlett-Packard Limited
176 - 200 of 518 Matches Previous Page    6 7 8 9 10 11    Next Page
 
SOFTWARE DEFINITION (continued): …  system software (which includes operating systems and any program that supports application software). The term middleware is sometimes used to describe programming that mediates between application and system software or between two different kinds of application software (for example, sending a remote work request from an application in a computer that has one kind of operating system to an application in a computer with a different operating system).An additional and difficult-to-classify category of software is the utility, which is a small useful program with limited capability. Some utilities … 
Software definition sponsored by SearchSOA.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement