ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications ManagementResearch

  • Web Application Hosting in the AWS Cloud

    Sponsored by: Amazon Web Services

    This white paper explores why IT managers and architects should look to the cloud to achieve the scalability they need for on-demand computing, and introduces Amazon Web Services (AWS) cloud as a way to do so.

  • The Total Cost of (Non) Ownership of Web Applications in the Cloud

    Sponsored by: Amazon Web Services

    View this white paper for an in-depth total cost of ownership (TCO) analysis of deploying a web application on-premises versus in the Amazon Web Services (AWS) cloud in three example scenarios.

  • Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Sponsored by: Imperva

    This on-demand webinar, Gartner Research Director Adam Hils discusses how IPS and NGFWs leave dangerous gaps in enterprise security, explains why web application firewalls (WAFs) are worth the investment for enterprises, and reviews the major features of WAF technology, deployment options and selection guidelines.

  • 2014 Gartner Magic Quadrant for Web Application Firewalls

    Sponsored by: Imperva

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

  • Making the case for the cloud in common use airport technology

    Sponsored by: ComputerWeekly.com

    This report from Amadeus looks at the business case for cloud computing in airports.

  • Global 100 Manufacturer Reduces Risk Across 30,000 Domains in 8 Days

    Sponsored by: Veracode, Inc.

    Many globally-operating enterprises suffer from the same problem: identifying and securing web applications over tens of thousands of IP addresses. This brief case study illustrates how one global 100 manufacturer overcame this challenge by transitioning to a cloud-based application security platform.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM

    Sponsored by: Dell Software

    Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.

  • Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX

    Sponsored by: Dell Software

    Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.

  • Limelight Orchestrate Performance

    Sponsored by: Limelight Networks, Inc.

    This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.

  • Addressing Performance Testing

    Sponsored by: Borland, Micro Focus

    In this podcast, discover why performance testing is necessary for modern development organizations, the challenges they face, and how they can be addressed by using the right performance testing tools.

  • Challenges around web 2.0 apps and how performance tools can help

    Sponsored by: Borland, Micro Focus

    Tune in to this podcast to explore challenges specific to web 2.0 applications and learn how to meet the performance testing needs of these apps with an enterprise-class performance testing tool.

  • Gaming Company Uses Cloud Infrastructure for Top Performance

    Sponsored by: IBM

    In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission.

  • Drowning in a Sea of Downtime

    Sponsored by: Borland, Micro Focus

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.

  • Learn How to Gain the Business Advantage of APIs

    Sponsored by: Mashery

    Download this Gartner report now.

  • Tolly Test Report: IBM Security Web Gateway Appliance

    Sponsored by: IBM

    This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.

  • Web CMS Featuring Video Integration

    Sponsored by: e-Spirit AG

    In this resource, learn about a technology that enables integration of web applications into a CMS, so they can be centrally opened and edited, improving efficiency and making better web pages. Specifically, take a look at a video integration module that allows you to easily integrate videos into web pages, online shops and portals.

  • 5 Pillars of API Management

    Sponsored by: CA Technologies.

    Application programming interfaces (APIs) form the foundation of today's open enterprise, allowing data to be shared between on-premise applications and data to Web apps, smart devices, and the cloud. But APIs open up new concerns for management and security that must be considered for safe, effective API usage.

  • Discovering Vulnerable Web Applications

    Sponsored by: Qualys

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  • API Management is the SOA Renaissance

    Sponsored by: IBM

    Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.

  • Breaking down silos of protection: An integrated approach to managing application security

    Sponsored by: IBM

    This resource explores the critical risks created by application growth, why point products are unable to offer adequate protection, and the value of taking an integrated approach to managing application security.

  • Protect people, processes and technology from web application threats

    Sponsored by: IBM

    This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

  • Delivering the Data Layer of the Cloud: The Business Case for APIs

    Sponsored by: StrikeIron

    In this white paper, explore the business case for APIs and learn why it may be a good idea to publish APIs for your organization. Compare the options of building your API capabilities internally and leveraging an API platform provider to achieve end-to-end API management.

  • Hosting is Dead

    Sponsored by: Pantheon

    When launching a website, many businesses invest in a hosting service but they still don't have the infrastructure needed to handle load spikes, fix bugs, and add features. If like many companies, you chose Drupal to remain agile, managing and changing your website should be no different -- but traditional hosting can hold you back.

  • Five Ways to Address the Challenges of Data Delivery in a Mobile Environment

    Sponsored by: TIBCO Software Inc.

    To truly embrace mobility, businesses need to communicate with all kinds of devices, regardless of model or age. In this solution brief, explore five principles that will help you address the challenges of exchanging data in real-time with mobile devices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.