ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • The Evolution of Web-Based Capture and Information Management

    Sponsored by: Kodak Alaris

    Learn about web- and browser-based capture technology and find out how you can overcome 5 information management and security challenges as you move further towards the ideal of paperless processes.

  • Changes to the Mobile, App Modernization, and Refactoring Landscape

    Sponsored by: PowWow

    The mobile development, app modernization, and app refactoring landscape is changing. Access this resource to find out how PowWow Mobile is affecting this change and creating support for native apps built on the Universal Windows Platform. Find out how refactoring technology can simplify the transformation of legacy web apps on mobile devices.

  • Tracker Corp Modernizes I-9 Compliance App to Streamline Mobile Onboarding

    Sponsored by: PowWow

    This case study explores how Tracker Corp leveraged a mobile development platform to modernize and extend their custom web app out to mobile users with no disruptions to their business. Learn how they overcame their lack of experienced in-house mobile developers to create a seamless and secure user experience.

  • A Security Champion's Guide to Web Application Security

    Sponsored by: Akamai

    Access this resource for tips on ensuring your web applications aren't the weakest link in your enterprise security strategy.

  • Making the case for the cloud in common use airport technology

    Sponsored by: ComputerWeekly.com

    This report from Amadeus looks at the business case for cloud computing in airports.

  • End Web Application Security Risks with WAF

    Sponsored by: F5 Networks

    In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.

  • Preparing Your Toolbox for the SharePoint Framework

    Sponsored by: Progress

    Explore the new SharePoint Framework and the variety of benefits for HTML5, JavaScript, and SharePoint app developers. Discover how to customize SharePoint easily by leveraging the open source framework's key features and web stack tools, including built-in themes, a SharePoint-tailored DataSource component, and more.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Modern Mobility E-zine: February 2016

    Sponsored by: SearchMobileComputing

    In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Protecting Against Web Application Threats Using SSL

    Sponsored by: Symantec Website Security Solutions

    In this resource, readers learn about the many factors that leave web applications vulnerable to attack; how SSL encryption can help to prevent the risk of data loss; how to assess their current state of vulnerability; and much more.

  • Enterprise Mobility Management E-Book Part 2

    Sponsored by: SearchMobileComputing

    In part 2 of this Enterprise Mobility Management e-book, discover the ins and outs of mobile device management, including how Exchange ActiveSync is as valuable as an MDM tool, using MDM for iOS, and using MDM for Android. In addition, learn about remote Windows desktop apps and web apps as they relate to mobility.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Protect People, Processes and Technology from Web Application Threats

    Sponsored by: IBM

    Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.

  • Developing Mobile Applications for the Cloud, with the Cloud

    Sponsored by: IBM

    In this e-guide, experts define the key differences between native, hybrid, Web and cloud mobile applications, and they highlight best practices for testing and developing them. Learn how mobile development teams are finding success by leveraging cloud-based products such as PaaS, SaaS and IaaS services.

  • How a Top E-Commerce Strategy Leads to Strong Sales

    Sponsored by: ZeroLag Communications Inc.

    In this e-guide, Brian K. Walker of Forrester and other experts provide six key factors that can make or break a customer's shopping experience and, ultimately, an e-commerce business.

  • Introducing Big Data Repository/Reporting to Support Web Analytics and User-Centric APM

    Sponsored by: Dell Software

    Learn the capabilities of Dell™ Foglight™ Application Performance Monitoring (APM) 5.9, and how the deep visibility into transaction flows and User Experience capitalize on innovative Big Data Technology.

  • Four Ways to Modernize Your Application Performance Monitoring Strategy for Web 2.0 and AJAX

    Sponsored by: Dell Software

    Learn how Web 2.0 technologies can increase the speed and efficiency of Web applications, while uniquely combining the best of traditional and modern approaches to deliver a well-rounded application performance monitoring (APM) solution.

  • Web Content Acceleration for Brilliant Storytelling

    Sponsored by: Limelight Networks, Inc.

    This informative guide explores one company's solution to your network performance woes and outlines the benefits of implementation.

  • Drowning in a Sea of Downtime

    Sponsored by: Borland, Micro Focus

    With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.

  • Discovering Vulnerable Web Applications

    Sponsored by: Qualys

    This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program.

  • API Management is the SOA Renaissance

    Sponsored by: IBM

    Forward-thinking organizations are moving to more open ecosystems, relying on service-oriented architecture (SOA) and application programming interfaces (APIs). Access this insightful white paper to learn about combining SOA and API management to create more engaging applications through comprehensive integration.

  • Tolly Test Report: IBM Security Web Gateway Appliance

    Sponsored by: IBM

    This whitepaper details a security solution to sure up the vulnerabilities associated with web application exposure.

  • An Integrated Approach to Managing Application Security

    Sponsored by: IBM

    This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.