ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • Evolving Enterprise and Contact Centers with WebRTC

    Sponsored by: Oracle Corporation UK Ltd

    Discover the state of the WebRTC marketplace and delve into various use cases and frameworks for assessing ROI. All for the purpose of helping you make the best communications adoptions for your enterprise.

  • AngularJS 2.0: Benefits & Challenges to Prepare for

    Sponsored by: Pluralsight

    With Angular 2.0 constantly changing, how can you figure out what works well and what doesn't and prepare for the changes ahead? Discover the major differences between Angular 1.0 and 2.0 and the benefits of 2.0. Learn how you can migrate an Angular 1.0 app to Angular 2.0.

  • Achieve Compliance and Cost Control

    Sponsored by: Matrix42

    Cloud computing, in spite of being only about ten years old, continues to gain market share in the enterprise. Analyst house Market Research Media estimates that the global cloud computing market will grow at a 30% CAGR, reaching $270 billion in 2020.

  • Getting a handle on mobile devices – securely, reliably and tidily

    Sponsored by: Matrix42

    Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.

  • Optimal RAID Options for SSDs Supporting Read-Intensive Web Applications

    Sponsored by: Micron Technology

    This resource presents the results of tests conducted to determine the optimal RAID configuration for SSDs supporting read-intensive web serving applications. Learn which RAID configurations lead to a higher number of transactions per minute and improved responsiveness to transaction requests for read-only and read-mostly workloads.

  • Bypassing Security Policies using Insufficient Authorization

    Sponsored by: WhiteHat Security

    This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.

  • The Value of Advanced Analytics in Application Performance Management

    Sponsored by: CA Technologies.

    This white paper presents strategies for keeping up with complex, dynamic, and interconnected applications. Access now and learn ways to leverage advanced analytics with application performance management tools.

  • Protecting Against Web Application Threats Using SSL

    Sponsored by: Symantec Website Security Solutions

    In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.

  • Making the case for the cloud in common use airport technology

    Sponsored by: ComputerWeekly.com

    This report from Amadeus looks at the business case for cloud computing in airports.

  • Modern Mobility E-zine: February 2016

    Sponsored by: SearchMobileComputing

    In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Enterprise Mobility Management E-Book Part 2

    Sponsored by: SearchMobileComputing

    In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Developing Mobile Applications for the Cloud, with the Cloud

    Sponsored by: IBM

    In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM

    Sponsored by: Dell Software

    Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.

  • Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX

    Sponsored by: Dell Software

    Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.

  • Web Content Acceleration for Brilliant Storytelling

    Sponsored by: Limelight Networks, Inc.

    This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.

  • Drowning in a Sea of Downtime

    Sponsored by: Borland, Micro Focus

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.

  • Discovering Vulnerable Web Applications

    Sponsored by: Qualys

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  • API Management is the SOA Renaissance

    Sponsored by: IBM

    Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.

  • Tolly Test Report: IBM Security Web Gateway Appliance

    Sponsored by: IBM

    This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.

  • An Integrated Approach to Managing Application Security

    Sponsored by: IBM

    This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.