Software  >   Applications Software  >  

Internet Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet SoftwareWhite Papers (View All Report Types)
 
Migrate Oracle Forms to the Web: Making the Business Case
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
WHITE PAPER: There are many reasons organizations are currently migrating their Oracle Forms applications to the Web. This white paper will discuss those issues and review the challenges that can occur during a conversion project. As well, it will discuss the options for migrating Oracle Forms, including moving to Forms 10g and migrating to Java.
Posted: 20 Jul 2009 | Published: 20 Jul 2009

CipherSoft, Inc., A subsidiary of Unify Corp.

The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com's Internet Application Development Platform
sponsored by Salesforce.com
WHITE PAPER: To meet the extreme demands of its large user population, Force.com's foundation is a metadatadriven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application.
Posted: 10 Mar 2009 | Published: 09 Mar 2009

Salesforce.com

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

How to use Collaboration Oriented Architectures
sponsored by ComputerWeekly.com
WHITE PAPER: Collaboration Oriented Architectures (COA) describes information architectures that comply with the COA framework, which in turn is described in the associated COA Framework paper1.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Benefits of Citrix NetScaler for Ajax Applications
sponsored by Citrix
WHITE PAPER: In this whitepaper learn the many benefits of Citrix NetScaler for Ajax applications. Discover how NetScaler speeds up the initial load of an Ajax application and helps ensure that the benefits of asynchronous communication are not delayed.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER: Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009

Qualys

Managing Application Performance to Achieve Mission Success
sponsored by CA Technologies.
WHITE PAPER: The reliance on web-based applications in government organizations has significant consequences. Success depends on end users' ability to interact well with their web applications. The key to success is an application performance management strategy that monitors end-user experiences and application performance from a transaction perspective.
Posted: 29 Apr 2009 | Published: 01 Feb 2008

CA Technologies.

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement