ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Software Research

  • How a Data Scientist Built a Web-Based Data Application

    Sponsored by: Exaptive

    This article features data scientist Frank D. Evans' step-by-step guide to building interactive data applications. Take a look behind the curtain at how Evans effectively communicates visuals without having to write glue code.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Best Practices for Web Application Security

    Sponsored by: WhiteHat Security

    Access this exclusive e-guide to discover tips for tackling web application security through software development. Learn how to review your Web application security assessment tools and develop a strategy.

  • Enabling IT Redundancy and Scalability for High-Availability Logistics Software

    Sponsored by: CyrusOne

    Inside this case study, you will find out how Aljex Software adopted a comprehensive cloud hosting solution, and discover the benefits of this adoption, including a robust backup and data archiving platform. Read on to learn how they supported their robust IT infrastructure and discover how you can do the same.

  • An Enterprise Architect’s Guide to API Integration for ESB and SOA

    Sponsored by: CA Technologies.

    This resource is an enterprise architect's guide to API integration for ESB and SOA, providing an overview of the app economy and enabling you to better understand API management in action. Read on to explore a number of ways that a powerful API management solution can streamline and empower your enterprise.

  • API Monetization: Unlocking the Value of Your Data

    Sponsored by: CA Technologies.

    In this resource, you'll learn how the right API management platform can help you to securely expose your APIs and charge for access to your business data, while providing developers with the information they need to create applications against them.

  • A Guide to REST and API Design

    Sponsored by: CA Technologies.

    Representational State Transfer (REST) is a web architecture style with universal constraints, enabling developers to build interfaces that can be used from nearly any device or operating system. This informative resource is packed with information on leveraging REST and API design to build applications that can last a long time.

  • Red Hat JBoss Developer Studio

    Sponsored by: Red Hat

    This white paper explains how JBoss Developer Studio provides developers the support needed for developing, testing, and deploying rich web apps, mobile web apps, transactional enterprise apps, and SOA-based integration apps and services.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • WebRTC Primer: How It's Being Used And Its Impact On The Network

    Sponsored by: SearchSecurity.com

    This expert guide from SearchUnifiedCommunications.com explores what WebRTC is, how it's being used, its potential impact on the network, and standards under development. Read on to find out if this new technology is a fit for your organization.

  • Smart cards: security risks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

  • The Human Face of Big Data: Data Driven

    Sponsored by: ComputerWeekly.com

    Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.

  • Gartner: HTML5 and the journey to the modern web

    Sponsored by: ComputerWeekly.com

    Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.

  • Met Office: The changing role of social media

    Sponsored by: ComputerWeekly.com

    Dave Britton, chief press officer of the Met Office, explains how the Met has harnessed social media, in this presentation.

  • Legacy IT Systems: Keep 'Em or Cut 'Em?

    Sponsored by: SearchCIO.com

    How do you calculate the expiration date on your legacy IT systems? We explore the keep-vs.-cut dilemma in this issue of CIO Decisions.

  • Computer Weekly – 21 October 2014: Managing digital projects

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the project management challenges for IT teams that are building digital, agile systems. We look at the growing importance of user experience testing driven by mobile app development. And Intel's CIO talks about managing IT at the world's largest chip manufacturer. Read the issue now.

  • Accelerate Delivery of Web Applications with this Tool

    Sponsored by: IBM

    Watch this brief video for an overview of a software product that acts as a web application server -- providing a framework and middleware for Java-based web applications

  • Protect People, Processes, and Technology From Web Application Threats

    Sponsored by: IBM

    This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

  • 10 Ways You Can Improve Web App Performance

    Sponsored by: SOASTA, Inc

    This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.

  • Limelight OrchestrateTM Performance - Technical Specifications

    Sponsored by: Limelight Networks, Inc.

    The following white paper details exactly how to ensure that the delivery of your websites and web-based applications is fast, agile, and optimized.

  • Arekibo- Ireland's Leading Digital Agency Saves 75% Development Time with Kendo UI

    Sponsored by: Telerik

    In this case study, learn how Arekibo, Ireland's leading digital consulting agency, succeeded in delivering a compelling web experience using HTML5 and JavaScript, while also saving 75% on development time.

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • Become a Java developer

    Sponsored by: IBM

    Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.

  • Setting the Foundation for Exceptional Performance

    Sponsored by: Neustar®

    Join Neustar’s performance expert as he discusses how to set the stage for performance. In this informative webcast you will learn about: foundations of web performance; getting to stability; building high performance systems; and high quality operations.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.