ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • Is Java Ready for the Era of Cloud Natives?

    Sponsored by: Oracle Corporation UK Ltd

    What helps Java continue to thrive as a web development tool in a world full of programming languages? Explore the current state of Java and how it's being used in cloud-native infrastructures. Learn more about Java and the cloud by exploring the classification of cloud natives, the relationship between Java and microservices, and more.

  • Measuring Web App Performance Into and Across Cloud Providers

    Sponsored by: AppNeta

    End user experience is what drives business. To ensure the best possible experience, IT teams need the ability to monitor off-premise apps and services. This webcast teaches you which metrics require attention in measuring app performance, why slow response times are as problematic as downtime, and more.

  • Preparing Your Toolbox for the SharePoint Framework

    Sponsored by: Progress

    Explore a framework for building web apps that provides a variety of benefits for HTML5, JavaScript, and SharePoint developers. Discover how to deliver valuable customizations by leveraging the framework's key features and web stack tools, including built-in themes, a SharePoint-tailored DataSource component, and more.

  • Maximize Performance and Mitigate Risks with PHP 7

    Sponsored by: Rogue Wave Software

    This white paper examines PHP, a tried and true platform for business-critical apps that has driven web and mobile growth for a number of years. Access now to learn more about the release of PHP 7, which introduces new language constructs and significantly enhanced performance, and uncover insightful tips on how to optimize your use of PHP.

  • Web Application Hosting: Leverage Best Practices and Cloud Architectures

    Sponsored by: IBM

    As web apps diversify and increase in number, so do the many ways to manage and maintain the infrastructures powering these apps. This e-book explores one way to apply industry-adopted standard architecture capabilities to app deployments so you can grow and advance your infrastructure.

  • Making the case for the cloud in common use airport technology

    Sponsored by: ComputerWeekly.com

    This report from Amadeus looks at the business case for cloud computing in airports.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Modern Mobility E-zine: February 2016

    Sponsored by: SearchMobileComputing

    In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Protecting Against Web Application Threats Using SSL

    Sponsored by: Symantec Website Security Solutions

    In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.

  • Enterprise Mobility Management E-Book Part 2

    Sponsored by: SearchMobileComputing

    In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Developing Mobile Applications for the Cloud, with the Cloud

    Sponsored by: IBM

    In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Web Content Acceleration for Brilliant Storytelling

    Sponsored by: Limelight Networks, Inc.

    This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.

  • Drowning in a Sea of Downtime

    Sponsored by: Borland, Micro Focus

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.

  • Discovering Vulnerable Web Applications

    Sponsored by: Qualys

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  • API Management is the SOA Renaissance

    Sponsored by: IBM

    Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.

  • Tolly Test Report: IBM Security Web Gateway Appliance

    Sponsored by: IBM

    This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.

  • An Integrated Approach to Managing Application Security

    Sponsored by: IBM

    This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.

  • Protect People, Processes, and Technology From Web Application Threats

    Sponsored by: IBM

    This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

  • Web CMS Featuring Video Integration

    Sponsored by: e-Spirit AG

    In this resource, learn about a technology that enables integration of web applications into a CMS, so they can be centrally opened and edited, improving efficiency and making better web pages. Specifically, take a look at a video integration module that allows you to easily integrate videos into web pages, online shops and portals.

  • Your Personal Web Attack Survival Guide

    Sponsored by: Imperva

    This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.