ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Software White Papers

  • WebRTC Primer: How It's Being Used And Its Impact On The Network

    Sponsored by: TechTarget Security

    This expert guide from SearchUnifiedCommunications.com explores what WebRTC is, how it's being used, its potential impact on the network, and standards under development. Read on to find out if this new technology is a fit for your organization.

  • Presentation Transcript: Platform-as-a-Service Changes Everything, Again! Visual PaaS is Here!

    Sponsored by: TechTarget Data Center

    Sophisticated Visual PaaS offerings provide a unified environment that empowers both "hard-core programmers" as well as “citizen developers” to develop business applications. CIOs are seeing PaaS as a viable option to embrace "citizen developers" and make the transition from Information Technology to Business Technology.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: TechTarget Security

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Get Lost in the Cloud With HANA

    Sponsored by: TechTarget Search SAP

    This three-part handbook helps users get to the heart of the SAP cloud strategy. Learn from freelance writer Chris Maxcer about SAP HANA cloud tools, how customers are reacting to the push to the cloud, and how SAP is responding to user concerns.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Legacy IT Systems: Keep 'Em or Cut 'Em?

    Sponsored by: TechTarget CIO

    How do you calculate the expiration date on your legacy IT systems? We explore the keep-vs.-cut dilemma in this issue of CIO Decisions.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Computer Weekly – 21 October 2014: Managing digital projects

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the project management challenges for IT teams that are building digital, agile systems. We look at the growing importance of user experience testing driven by mobile app development. And Intel's CIO talks about managing IT at the world's largest chip manufacturer. Read the issue now.

  • Protect People, Processes, and Technology From Web Application Threats

    Sponsored by: IBM

    This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

  • 10 Ways You Can Improve Web App Performance

    Sponsored by: SOASTA, Inc

    This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.

  • Limelight OrchestrateTM Performance - Technical Specifications

    Sponsored by: Limelight Networks, Inc.

    The following white paper details exactly how to ensure that the delivery of your websites and web-based applications is fast, agile, and optimized.

  • Arekibo- Ireland's Leading Digital Agency Saves 75% Development Time with Kendo UI

    Sponsored by: Telerik

    In this case study, learn how Arekibo, Ireland's leading digital consulting agency, succeeded in delivering a compelling web experience using HTML5 and JavaScript, while also saving 75% on development time.

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • The Human Face of Big Data: Data Driven

    Sponsored by: TechTarget ComputerWeekly.com

    Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.

  • Become a Java developer

    Sponsored by: IBM

    Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.

  • Integrating Java EE applications and C-based implementations in WebSphere Application Server

    Sponsored by: IBM

    This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.

  • NetScaler VPX: Harness the Power of Virtualized Web App Delivery

    Sponsored by: Citrix

    This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.

  • Customer Satisfaction with Application Delivery Controller Vendors

    Sponsored by: Citrix

    Enterprise Management Associates Report: "Customer Satisfaction with Application Delivery Controller Vendors" - shows how Citrix NetScaler beats F5 and Cisco in customer satisfaction. Discover why Citrix is superior in 16 out of 21 categories and tops the competition in Presales, Tech Support, Product, Technology, and Overall Business Value.

  • The Dirty Dozen: Preventing Common Application-Level Hack Attacks

    Sponsored by: IBM

    This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.

  • Web 2.0 at Work: Departmental Use Cases

    Sponsored by: Oracle Corporation

    With the introduction of Web 2.0 technologies into your enterprise, you can greatly increase the value of your company's most important assets. Leading companies are harnessing Web 2.0 technologies and applying them to build their next-generation workplaces.

  • Advanced Load Balancing: 8 Must-have Features for Today's Network Demands

    Sponsored by: Citrix

    Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.

  • 5 Styles of Business Intelligence

    Sponsored by: MicroStrategy

    This paper looks at the historical development of BI applications and BI technology, and concludes that five common Styles of BI have evolved during the past decade - each style representing a certain characteristic usage.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.