ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Applications Software Research

  • Identity Proofing

    Sponsored by: Entrust, Inc.

    Today’s customers and end users demand fast, secure digital interactions from the organizations they do business with. This white paper highlights the key features and capabilities of Entrust Datacard’s ID Proofing offering, designed to provide fast, accurate and fully digital identity proofing. Read on to learn more.

  • Innovative data strategies for smarter predictions

    Sponsored by: Dataiku

    By leveraging a collaborative and flexible AI-based tool, Europcar was able to build a predictive web app as well as dashboards that forecasted market activity at a very granular level. Access this case study to learn more about the technology Europcar used and the positive impact the solution had.

  • Web Application Firewall Vendor Comparison Report

    Sponsored by: Barracuda

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • WebRTC Primer: How It's Being Used And Its Impact On The Network

    Sponsored by: SearchSecurity.com

    This expert guide from SearchUnifiedCommunications.com explores what WebRTC is, how it's being used, its potential impact on the network, and standards under development. Read on to find out if this new technology is a fit for your organization.

  • Smart cards: security risks

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.

  • The Human Face of Big Data: Data Driven

    Sponsored by: ComputerWeekly.com

    Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.

  • Gartner: HTML5 and the journey to the modern web

    Sponsored by: ComputerWeekly.com

    Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.

  • Met Office: The changing role of social media

    Sponsored by: ComputerWeekly.com

    Dave Britton, chief press officer of the Met Office, explains how the Met has harnessed social media, in this presentation.

  • How to use Collaboration Oriented Architectures

    Sponsored by: ComputerWeekly.com

    Collaboration Oriented Architectures (COA) describes information architectures that comply with the COA framework, which in turn is described in the associated COA Framework paper1.

  • Software testing: why it needs a new professionalism

    Sponsored by: ComputerWeekly.com

    We believe that Testing is at a key juncture in its development as a Profession. The demonstrable consequences of this approach are now very clear  - hidden, often major, costs in the  development  lifecycle of code arising both from the costs of fixing defects, and from the costs of managing change late in the lifecycle.

  • Designing a Modern Enterprise Architecture

    Sponsored by: Metavine

    In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.

  • Get Lost in the Cloud With HANA

    Sponsored by: SearchSAP

    This three-part handbook helps users get to the heart of the SAP cloud strategy. Learn from freelance writer Chris Maxcer about SAP HANA cloud tools, how customers are reacting to the push to the cloud, and how SAP is responding to user concerns.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Protect Your Web Applications from the OWASP Top 10

    Sponsored by: IBM

    Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.

  • Legacy IT Systems: Keep 'Em or Cut 'Em?

    Sponsored by: SearchCIO.com

    How do you calculate the expiration date on your legacy IT systems? We explore the keep-vs.-cut dilemma in this issue of CIO Decisions.

  • New Considerations for Application Integration

    Sponsored by: TheServerSide.com

    This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.

  • Computer Weekly – 21 October 2014: Managing digital projects

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the project management challenges for IT teams that are building digital, agile systems. We look at the growing importance of user experience testing driven by mobile app development. And Intel's CIO talks about managing IT at the world's largest chip manufacturer. Read the issue now.

  • Protect People, Processes, and Technology From Web Application Threats

    Sponsored by: IBM

    This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.

  • 10 Ways You Can Improve Web App Performance

    Sponsored by: SOASTA, Inc

    This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.

  • Limelight OrchestrateTM Performance - Technical Specifications

    Sponsored by: Limelight Networks, Inc.

    The following white paper details exactly how to ensure that the delivery of your websites and web-based applications is fast, agile, and optimized.

  • Arekibo- Ireland's Leading Digital Agency Saves 75% Development Time with Kendo UI

    Sponsored by: Telerik

    In this case study, learn how Arekibo, Ireland's leading digital consulting agency, succeeded in delivering a compelling web experience using HTML5 and JavaScript, while also saving 75% on development time.

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • Become a Java developer

    Sponsored by: IBM

    Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.

  • Integrating Java EE applications and C-based implementations in WebSphere Application Server

    Sponsored by: IBM

    This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.

  • IBM Mashup Center

    Sponsored by: IBM

    IBM Mashup Center is an enterprise mashup platform enabling the rapid creation of reusable application building blocks (widgets, feeds, mashups) that can be easily assembled into new applications or leveraged within existing applications— with the governance and security IT requires—  to address daily business challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.