ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • AngularJS 2.0: Benefits & Challenges to Prepare for

    Sponsored by: Pluralsight

    With Angular 2.0 constantly changing, how can you figure out what works well and what doesn't and prepare for the changes ahead? Discover the major differences between Angular 1.0 and 2.0 and the benefits of 2.0. Learn how you can migrate an Angular 1.0 app to Angular 2.0.

  • Keeping Cloud and Mobile Simple

    Sponsored by: Oracle Corporation

    The mobile device is a key component of the future of business and businesses need to take advantage of cloud and mobile applications in order to stay competitive. Access this brief webcast to discover how to stay above the competition.

  • Achieve Compliance and Cost Control

    Sponsored by: Matrix42

    Cloud computing, in spite of being only about ten years old, continues to gain market share in the enterprise. Analyst house Market Research Media estimates that the global cloud computing market will grow at a 30% CAGR, reaching $270 billion in 2020.

  • Getting a handle on mobile devices – securely, reliably and tidily

    Sponsored by: Matrix42

    Mobile access to data and applications is now the rule rather than the exception. This trend has notably spurred thegenesis of both web and SaaS applications, which are used on a daily basis by allcompanies of all sizes nowadays. This technological progress is confronting both IT professionals and ordinary users with new problems.

  • Cloud Services: The Linchpin of a Digital Engagement Platform

    Sponsored by: Oracle Corporation

    In this white paper, learn how cloud services can augment your engagement platform by providing benefits and capabilities such as: visual site creation for non-technical users, collaborative and extensible interface, microsite management all under one view, and more.

  • Optimal RAID Options for SSDs Supporting Read-Intensive Web Applications

    Sponsored by: Micron Technology

    This resource presents the results of tests conducted to determine the optimal RAID configuration for SSDs supporting read-intensive web serving applications. Learn which RAID configurations lead to a higher number of transactions per minute and improved responsiveness to transaction requests for read-only and read-mostly workloads.

  • IAM for Web Resources and APIs

    Sponsored by: Ping Identity Corporation

    This white paper teaches you how to harness open standards like SAML to enable secure web SSO, protect APIs, and provide dynamic session management to employees.

  • IAM Beyond Traditional WAM

    Sponsored by: Ping Identity Corporation

    Explore the 5 key attributes of API security in this exclusive white paper. Additionally, review the top 5 considerations for WAM migration and how to secure access to your IaaS/AWS environment.

  • How Modern Access Security Works

    Sponsored by: Ping Identity Corporation

    Review the 4 important differences between federated access management and traditional WAM and uncover why WAM has failed now that apps have moved on from a web-only environment. Read on to learn the 5 key benefits of modern access security.

  • Building the Business Case for Modern Access Management

    Sponsored by: Ping Identity Corporation

    Discover the 4 questions you need to consider when building your IAM strategy to protect users, customers, third-parties, and sensitive data.

  • Bypassing Security Policies using Insufficient Authorization

    Sponsored by: WhiteHat Security

    This recording of a live webcast discusses the details of how Insufficient Authorization attacks work.

  • The Value of Advanced Analytics in Application Performance Management

    Sponsored by: CA Technologies.

    This white paper presents strategies for keeping up with complex, dynamic, and interconnected applications. Access now and learn ways to leverage advanced analytics with application performance management tools.

  • Making the case for the cloud in common use airport technology

    Sponsored by: ComputerWeekly.com

    This report from Amadeus looks at the business case for cloud computing in airports.

  • Modern Mobility E-zine: February 2016

    Sponsored by: SearchMobileComputing

    In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Enterprise Mobility Management E-Book Part 2

    Sponsored by: SearchMobileComputing

    In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Developing Mobile Applications for the Cloud, with the Cloud

    Sponsored by: IBM

    In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM

    Sponsored by: Dell Software

    Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.

  • Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX

    Sponsored by: Dell Software

    Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.

  • Web Content Acceleration for Brilliant Storytelling

    Sponsored by: Limelight Networks, Inc.

    This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.

  • Drowning in a Sea of Downtime

    Sponsored by: Borland, Micro Focus

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.