Software  >   Systems Software  >   Programming Languages  >   Object-Oriented Programming Languages  >   Java  >  

Applets

RSS Feed    Add to Google    Add to My Yahoo!
Applets Reports
 
Managing Java Security in the Enterprise
sponsored by Browsium
WHITE PAPER: Enabling Java apps for the internet has resulted in a variety of compatibility and security issues due to JRE incompatibilities, as well as unlimited threat vectors on the web. This paper covers two primary challenges directly related to ongoing Java security threats. Read on to find detailed guidance for managing Java security in the enterprise.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Browsium

Why Upgrade to WebSphere Application Server V8?
sponsored by IBM
WHITE PAPER: IBM WebSphere Application Server V8.0 delivers complete Java EE 6 support and certification; increased support for programming models and standards; enhanced performance, administration and security capabilities; faster problem determination; directory-based Java EE application installs; and simplified product installations and maintenance.
Posted: 10 Oct 2011 | Published: 01 Jul 2011

IBM

How to Increase Deployment Speed, Quality, and Simplicity
sponsored by SERENA Software, Inc.
SOFTWARE DOWNLOAD: Access this page now to sample software that can enable your business to deliver high-quality, valuable software in an efficient, fast, and reliable manner.
Posted: 23 Apr 2015 | Premiered: 23 Apr 2015

SERENA Software, Inc.

12 Essential Capabilities for Mobile Testing Solutions
sponsored by Hewlett-Packard Limited
BROCHURE: This resource explains the 12 capabilities that your mobile testing solution needs to have in order to ensure that your software will perform for your users under real-world conditions.
Posted: 14 Apr 2015 | Published: 30 Sep 2014

Hewlett-Packard Limited

When IT Service Management isn’t What it Could Be: The Importance of Kaizen in ITSM
sponsored by Unisys
WHITE PAPER: This whitepaper focuses on how you can combine ITSM best practices with a Kaizen approach to eliminate IT inefficiencies and excess costs while modernising your overall service management framework.
Posted: 06 May 2015 | Published: 01 Oct 2014

Unisys

The Real Cost of Driverless Cars for Cybersecurity and Reliability
sponsored by Rogue Wave Software
WHITE PAPER: Several car manufacturers predict that self-driving cars will be on the road by 2020. What are the implications of the rapid increase in automotive software complexity for cybersecurity and reliability as development teams race to deliver this content?
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Rogue Wave Software

Best Practices: Continuous Delivery for the Enterprise
sponsored by SERENA Software, Inc.
WEBCAST: Access this webcast to learn about how to utilize continuous delivery so that your software can be released into production at any time. Make sure to tune in to answer your important questions about continuous delivery.
Posted: 27 Apr 2015 | Premiered: Apr 27, 2015

SERENA Software, Inc.

Let Financial Reporting Lead the Way To Efficient Planning
sponsored by Tagetik Software
EGUIDE: This e-guide offers 3 best practices to help drive operations teams' involvement with financial planning, as well as tips on choosing the right tools to improve financial assessment. Additionally, discover the hidden forecasting benefits of implementing corporate performance management (CPM) software.
Posted: 22 May 2015 | Published: 22 May 2015

Tagetik Software

Corporate Roadblocks to Agile Adoption and Evolution
sponsored by Catalyst IT
WHITE PAPER: This white paper addresses the corporate roadblocks that impede the adoption and evolution of software development methodologies, particularly those within Agile frameworks.
Posted: 07 Apr 2015 | Published: 31 Dec 2014

Catalyst IT

Smart cards: security risks
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security Thesis series assess the new features introduced in Java Card 3 Connected Edition smart card specification and their associated security risks.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

ComputerWeekly.com

Mobile NFC in Retail
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from the GSMA explains the opportunities for NFC Mobile communications in retail.
Posted: 09 Nov 2012 | Published: 01 Nov 2012

ComputerWeekly.com

Mobile NFC in Transport
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth report from the GSMA explains the opportunities for NFC Mobile communications in transport.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Establishing Trust in User Identities with Strong Authentication Technologies
sponsored by HID
WHITE PAPER: Learn how organizations conveniently and cost-effectively authenticate and secure individual enterprise and cloud-based applications along with data resources.
Posted: 31 Jul 2014 | Published: 20 Mar 2014

HID

3 Things Business Decision Makers Need To Know About SOA
sponsored by IFS
WHITE PAPER: In this white paper, uncover the three most important things you should know about service-oriented architecture (SOA) in order to be sure you are getting the most efficient and effective performance out of your enterprise application architecture.
Posted: 18 Jan 2012 | Published: 18 Jan 2012

IFS

Time-Saving PowerShell Solutions for the Busy Admin
sponsored by NetApp & Cisco
WHITE PAPER: This guide delivers insight into how you can start building a relationship with PowerShell. You'll also get an understanding of how powerful, simple, one-line commands can be.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

NetApp & Cisco

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Connected enterprise is the key to collaboration and cutting costs
sponsored by ComputerWeekly.com
WHITE PAPER: This six-page Buyer’s Guide to Connected Enterprise explains how CIOs and senior IT professionals can harness connected enterprise to make their organisations more competitive through better responsiveness and decision making.
Posted: 29 Nov 2012 | Published: 19 Jan 2011

ComputerWeekly.com

Stepping Up the Battle Against Advanced Threats
sponsored by IBM
WHITE PAPER: This essential white paper breaks down how application control can keep your endpoints secure in today's changing IT threat landscape.
Posted: 17 Sep 2013 | Published: 30 Aug 2013

IBM

SANS - Securing Web Applications Made Simple and Scalable
sponsored by Hewlett-Packard Company
ANALYST REPORT: This SANS report features an automated application security testing solution that identifies known vulnerabilities across multiple sources to keep your networks fully protected.
Posted: 01 Feb 2015 | Published: 30 Sep 2013

Hewlett-Packard Company

Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

The Best of RSA: Mobile Security
sponsored by SearchSecurity.com
EGUIDE: To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
Posted: 03 May 2012 | Published: 03 May 2012

SearchSecurity.com

Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Founding Principles
sponsored by ComputerWeekly.com
WHITE PAPER: The overriding goals for Data Centre Consolidation, the G-Cloud and the Applications Store for Government are:Reduce ICT costs;Provide open competition and create a vibrant marketplace enabling the best product at the best price;Create flexibility.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

The Open Group - Cloud Computing guide to interoperability and portability
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

G-Cloud Report: Data Centre Strategy, G-Cloud & Applications Store for Government Programme – Implementation Strategy
sponsored by ComputerWeekly.com
WHITE PAPER: The Data Centre Strategy, G-Cloud and Applications Store for Government Programme (hereafter the „G-Cloud Programme‟) are 3 of the 14 strands of the Government ICT Strategy.Phase 2 of the programme started in October 2009 and ran until the middle of February 2010.
Posted: 21 Oct 2011 | Published: 07 Feb 2011

ComputerWeekly.com

Information Security – May 2014
sponsored by SearchSecurity.com
EZINE: The online authentication protocols proposed by the Fast Identity Online Alliance face a reality check. As FIDO-ready products ship, what are the implications for enterprises?
Posted: 30 Apr 2014 | Published: 30 Apr 2014

SearchSecurity.com

Windows 2012 Server Network Security
sponsored by ComputerWeekly.com
BOOK: This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and  IPv6. It includes a 30% discount code for Computer Weekly readers.
Posted: 02 Sep 2013 | Published: 02 Sep 2013

ComputerWeekly.com

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Apps Revolution
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

ComputerWeekly.com

Today's Top Security Risks Revealed
sponsored by Hewlett-Packard Company
WHITE PAPER: This extensive white paper explores the current state of security threats that organizations are up against. Read on to learn how to prepare and strengthen defenses against evolving attacks.
Posted: 28 Apr 2015 | Published: 15 Apr 2015

Hewlett-Packard Company

Examining the Current Cyber Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: With attacks no longer a question of "if" but "when," it's crucial to know what your enemies are up to. This white paper examines the prevalent vulnerabilities in organizations today, how hackers are exploiting them, and which tools they are using to get the job done.
Posted: 28 Apr 2015 | Published: 28 Feb 2015

Hewlett-Packard Company

MapXtreme Java v4.8.1
sponsored by MapInfo Corporation
TRIAL SOFTWARE: This IT Download, MapXtreme Java, provides a Java mapping engine which facilitates optimized location intelligence on the desktop, over the internet, or through an intranet.
Posted: 10 Mar 2008 | Premiered: 10 Mar 2008

MapInfo Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement