Software  >   Systems Software  >   Programming Languages  >   Markup Languages  >   HTML  >  

Dynamic Hypertext Markup Language

RSS Feed    Add to Google    Add to My Yahoo!
Dynamic Hypertext Markup Language Reports
 
AJAX for Graphics-Intensive Web Applications
sponsored by ILOG, an IBM Company
WHITE PAPER: Learn how AJAX works and how it is leveraged to create advanced web displays with graphical user interfaces by increasing interactivity and reducing roundtrips to the server.
Posted: 15 Aug 2007 | Published: 01 Jun 2006

ILOG, an IBM Company

Hermes Case Study: Hermes Uses FuseSource for UK’s Largest Retail Network
sponsored by Red Hat
CASE STUDY: The UK's largest retail network faced the challenge of supporting customer demand for access to real-time, online tracking information. Learn how Hermes used Red Hat JBoss Fuse to reduce the time it takes for receiving and pushing out tracking data to customer facing web applications from hours to just 60 seconds!
Posted: 27 Aug 2014 | Published: 31 Dec 2012

Red Hat

BVOXY
sponsored by ControlNow
CASE STUDY: Access this case study to learn how she used a single web-based tool that would help provide secure computers and a healthy network environment.
Posted: 20 Nov 2014 | Published: 20 Nov 2014

ControlNow

How to Unlock the Promise of Agile in the Enterprise
sponsored by Workfront
WHITE PAPER: This in-depth white paper discusses Agile, and how it can be implemented on a large scale. Read on to find out what benefits one can expect from enterprise-wide Agile implementation, and what challenges await.
Posted: 05 Feb 2015 | Published: 05 Feb 2015

Workfront

Your Chance to Test Drive a Comprehensive Security System
sponsored by AlienVault
SOFTWARE DEMO: This product demo gives you an opportunity to test drive a unified security management system.
Posted: 24 Feb 2015 | Premiered: 24 Feb 2015

AlienVault

BP Turns to Fujitsu for Technology Upgrade
sponsored by Cisco & Fujitsu
VIDEO: Find which vendor BP selected to ensure a seamless transition to their new operating system.
Posted: 20 Oct 2014 | Premiered: 11 Feb 2014

Cisco & Fujitsu

Deploy DevOps in Your Traditional Environment with Configuration Management Processes
sponsored by Red Hat
WEBCAST: Many companies are implementing new tactics and methodologies to help reduce their time to market and improve overall software quality. View this webcast now to learn how to implement DevOps for Java EE applications in a traditional, non-PaaS environment.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

Red Hat

Discover How Beth Israel Deaconess Medical Center Protects Vital Data
sponsored by CommVault
CASE STUDY: This white paper examines how the Beth Israel Deaconess Medical Center was able to implement a system that enabled improved management and more effective data recovery data with less risk, keeping them on top of compliance requirements
Posted: 10 Sep 2014 | Published: 31 Dec 2013

CommVault

Migration Engine from Butterfly Software
sponsored by IBM
WHITE PAPER: This resource provides an overview of the migration procedure and an explanation for how your organization can access all of its data from a single backup platform, improving your RTO and RPO objectives and ensuring you are legally compliant as well as reducing your overall carbon footprint.
Posted: 12 Nov 2014 | Published: 31 May 2013

IBM

Building a Mobile Strategy: Analyst Report Shows Key Components to Success
sponsored by Kony
ANALYST REPORT: Access this analyst report to discover how the enterprise appetite for mobilization grows – but progress has been slow.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Kony
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement