ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Management Research

  • Taking Action to Secure Web Applications

    Sponsored by: TechTarget Security

    This expert E-Guide from SearchSecurity.com explores the vulnerabilities of web applications and explores steps you should take to keep them safe.

  • Web-Facing Applications: Mitigating Likely Web Application Threats

    Sponsored by: TechTarget Security

    In this expert E-Guide, learn how the increased use of business-centric Web applications has spawned alarming new information security threats. Also inside, uncover tips, tricks, and best practices for making your Web apps more secure – read on to get started.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: TechTarget Security

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • E-Guide: Preventing and detecting security vulnerabilities in Web applications

    Sponsored by: TechTarget Security

    The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications.

  • Microsoft® SharePoint® Server 2010

    Sponsored by: Dell EMC and Microsoft

    This informative white paper contains a comprehensive load testing study of a small virtualized SharePoint Server farm and provides various architecture suggestions based on how many users you wish to support.

  • Network Strategies for Enhanced Application Performance and Delivery

    Sponsored by: TechTarget Networking

    This expert TechGuide from SearchEnterpriseWAN.com on network application performance optimization explains the top do's and don'ts that will help you achieve the application performance your users expect.

  • SSL Certificate Management: Common Mistakes and How to Avoid Them

    Sponsored by: Thawte Inc.

    This expert E-Guide explores the most common SSL certificate management mistakes that can set the stage for a Web application exploit, and offers key advice for avoiding these errors – read on to learn more now.

  • Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge

    Sponsored by: IBM

    This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting.

  • Prioritizing WAN Application Delivery Go Beyond WAN QoS

    Sponsored by: Talari_DON'T USE

    This E-Guide from SearchEnterpriseWAN.com describes why Quality of Service (QoS) is not the cure-all it used to be and explores how to go beyond the constraints of WAN QoS to safeguard and deliver the applications in your enterprise.

  • The Benefits of Next-Generation Virtual ADCs

    Sponsored by: Citrix Systems, Inc.

    Discover why next-generation and virtual application delivery controllers (ADCs) can help you conquer many of the networking and security challenges of enterprise mobility and cloud computing.

  • Best Practices for Architecting Your Hosted Systems for 100% Application Availability

    Sponsored by: Hosting.com

    Access this exclusive source to learn the best practices when dealing with managed hosting providers and how to best utilize your applications.

  • Elastic Scalability of Spring Java Applications with VMware vFabric Cloud Application Platform

    Sponsored by: VMware, Inc.

    Legacy middleware platforms are not only costly to run but also cannot provide the speed and scalability needed for the Web, mobile, and cloud applications that modern business has come to rely on. View this webcast to learn how to accelerate and reduce the cost of provisioning these applications.

  • Empowered Customers Drive Collaborative Business Evolution

    Sponsored by: IBM

    Read this groundbreaking new study, conducted by Forrester Consulting on behalf of IBM, to understand how empowered customers are changing the way business is doing business—today and in the future.

  • How Luxury Brands Can Reach The Growing Market in China - Presentation transcript

    Sponsored by: CDNetworks

    This presentation transcript explains how your business can leverage a global content delivery network (CDN) to increase application performance and deliver reliable ecommerce services to customers across the globe.

  • Enterprise API Patterns for Cloud & Mobile

    Sponsored by: Intel

    Read this white paper to learn best practices for utilizing application programming interfaces (APIs) in your organization. Review essential usage patterns key architectural requirements that can help you ensure success.

  • Imperva's Web Application Attack Report

    Sponsored by: Imperva

    Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.

  • Webinar: Best Practices in Managing and Monitoring Mobile End User Experiences

    Sponsored by: Correlsense

    Watch this webcast to discover best practices for managing and monitoring your mobile end-user experiences. Learn common technical issues businesses are facing in today's mobile environment and see case studies of different techniques organizations are using to monitor mobile web devices.

  • IBM Mashup Center

    Sponsored by: IBM

    IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.

  • Mobile Application Keeps KART Vans on a Roll

    Sponsored by: AT&T Corp

    This case study shows how The Kings County Area Public Transit Agency uses mobile applications to increase the effeciency of their rural transit vanpool program.

  • Imperva’s Web Application Attack Report

    Sponsored by: Imperva

    Imperva’s Application Defense Center studied web application attacks across 30 applications, monitoring more than 10 million individual attacks targeted over a period of six months. This report offers key findings of their study and recommendations to help you better prioritize vulnerability remediation and web application projects.

  • Minimize your financial institution’s risk with solutions from IBM

    Sponsored by: IBM

    Organisations face many challenges as they become more reliant on web technology: web applications are increasingly being targeted, and at the same time, compliance regulations continue to grow in complexity. Learn how to tackle these issues with IBM Rational, a comprehensive solution that provides protection, while helping to ensure compliance.

  • Developing Richer Web based Applications

    Sponsored by: QUALCOMM Incorporated

    This white paper describes industry developments that will lead the browser, JavaScript and the mobile processor to combine for web applications that perform on par with their native counterparts.

  • Handling Mobile Web Pages Better

    Sponsored by: QUALCOMM Incorporated

    In this white paper, find out how to get higher performance out of browser and JavaScript™ engines. Discover how to take advantage of Web Technologies optimizations to provide a user experience befitting the Truly Mobile Web.

  • What’s New in VMware ThinApp 4.6

    Sponsored by: VMware, Inc.

    It is important to remember that Web-based applications pose compatibility issues similar to native applications because of the underlying technology components used to create and run them. Learn how utilizing the right software allows you to ensure legacy application compatibility with each successive browser or operating system update.

  • Intela Keeps Consumers Engaged by Ensuring Online Performance with VMware vFabric tc Server

    Sponsored by: VMware, Inc.

    To ensure the reliability of its applications, lead generation and email marketing company Intela deployed VMware vFabric tc Server. Read this case study to learn how tc Server helped Intela increase productivity, improve application performance and availability, save on costs and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.