Software  >   Applications Software  >  

Internet Software

RSS Feed    Add to Google    Add to My Yahoo!
Internet Software White Papers (View All Report Types)
 
The Internet of Things Supply Chain: Data-driven, Agile, Real-time
sponsored by GT Nexus
WHITE PAPER: Learn more about the new technology driving the IoT. Read on to find out how you can provide immediate substantial benefits and create a strong foundation for your business in an environment where all parties, goods, assets, and sensors connect and communicate through the internet of things.
Posted: 17 Feb 2015 | Published: 31 Dec 2014

GT Nexus

The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com's Internet Application Development Platform
sponsored by Salesforce.com
WHITE PAPER: To meet the extreme demands of its large user population, Force.com's foundation is a metadatadriven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application.
Posted: 10 Mar 2009 | Published: 09 Mar 2009

Salesforce.com

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Migrate Oracle Forms to the Web: Making the Business Case
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
WHITE PAPER: There are many reasons organizations are currently migrating their Oracle Forms applications to the Web. This white paper will discuss those issues and review the challenges that can occur during a conversion project. As well, it will discuss the options for migrating Oracle Forms, including moving to Forms 10g and migrating to Java.
Posted: 20 Jul 2009 | Published: 20 Jul 2009

CipherSoft, Inc., A subsidiary of Unify Corp.

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

5 Styles of Business Intelligence
sponsored by MicroStrategy Incorporated
WHITE PAPER: This paper looks at the historical development of BI applications and BI technology, and concludes that five common Styles of BI have evolved during the past decade - each style representing a certain characteristic usage.
Posted: 09 Jun 2008 | Published: 01 Jan 2002

MicroStrategy Incorporated

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

Web Exploits: There’s an App for That
sponsored by M86 Security
WHITE PAPER: The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
Posted: 27 May 2010 | Published: 27 May 2010

M86 Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement