Software  >   Applications Software  >  

Internet Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Software White Papers (View All Report Types)
 
Data Management Designed for the Web, Mobile and Internet of Things Era
sponsored by IBM
WHITE PAPER: Database-as-a-Service (DBaaS) helps enable you to buy into a data management Service Level Agreement (SLA) instead of buying into a database technology, simplifying app development and delivery.Read this white paper to find out all the ways DBaaS can benefit your organization.
Posted: 06 Apr 2015 | Published: 31 Jan 2015

IBM

The Internet of Things Supply Chain: Data-driven, Agile, Real-time
sponsored by GT Nexus
WHITE PAPER: Learn more about the new technology driving the IoT. Read on to find out how you can provide immediate substantial benefits and create a strong foundation for your business in an environment where all parties, goods, assets, and sensors connect and communicate through the internet of things.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

GT Nexus

The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com's Internet Application Development Platform
sponsored by Salesforce.com
WHITE PAPER: To meet the extreme demands of its large user population, Force.com's foundation is a metadatadriven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application.
Posted: 10 Mar 2009 | Published: 09 Mar 2009

Salesforce.com

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

Migrate Oracle Forms to the Web: Making the Business Case
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
WHITE PAPER: There are many reasons organizations are currently migrating their Oracle Forms applications to the Web. This white paper will discuss those issues and review the challenges that can occur during a conversion project. As well, it will discuss the options for migrating Oracle Forms, including moving to Forms 10g and migrating to Java.
Posted: 20 Jul 2009 | Published: 20 Jul 2009

CipherSoft, Inc., A subsidiary of Unify Corp.

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
sponsored by Citrix
WHITE PAPER: Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
Posted: 19 Sep 2008 | Published: 07 Jun 2010

Citrix

Benefits of Citrix NetScaler for Ajax Applications
sponsored by Citrix
WHITE PAPER: In this whitepaper learn the many benefits of Citrix NetScaler for Ajax applications. Discover how NetScaler speeds up the initial load of an Ajax application and helps ensure that the benefits of asynchronous communication are not delayed.
Posted: 19 Sep 2008 | Published: 18 Sep 2008

Citrix

Web Application Security - How to Minimise Prevalent Risk of Attacks
sponsored by Qualys
WHITE PAPER: Read this white paper to understand how to minimise vulnerabilities in web applications. A guide to web application security outlines typical web application vulnerabilities and provides a comparison of web application vulnerability detection options.
Posted: 27 Mar 2009 | Published: 02 Mar 2009

Qualys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement