Software  >   Systems Software  >   Server Software  >  

Intranet Server Software

RSS Feed    Add to Google    Add to My Yahoo!
Intranet Server Software Reports
 
Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Rapid WebSphere Application Server Provisioning with WebSphere CloudBurst Appliance
sponsored by IBM
WHITE PAPER: This high level overview of the IBM WebSphere CloudBurst Appliance discusses current issues being faced in the information technology industry and how WebSphere CloudBurst addresses many of them.
Posted: 14 Oct 2010 | Published: 19 Feb 2010

IBM

Gilt Groupe Triples Web Traffic within a year with Riverbed Stingray
sponsored by Riverbed Technology, Inc.
CASE STUDY: With over 5,000 requests per second during peak periods, online retailer Gilt Groupe could lose a large percentage of its daily profits in just 10 minutes of downtime. After choosing the Riverbed Stingray Traffic Manager as its load balancing solution, visits to the site have increased thanks to improved customer satisfaction.
Posted: 07 Nov 2011 | Published: 07 Nov 2011

Riverbed Technology, Inc.

Testing EJBs with JUnit
sponsored by Sybase, an SAP company
WHITE PAPER: This paper will introduce you to JUnit and how it can help make testing easier.
Posted: 02 Jun 2002 | Published: 24 Oct 2001

Sybase, an SAP company

An Introduction to Sharepoint 2010
sponsored by DellEMC and Intel®
WHITE PAPER: This paper provides an overview of common business use cases for which SharePoint is a good fit, introduces the services and functionality within SharePoint Server 2010, highlights key changes from MOSS 2007, and helps readers understand the terminology and concepts needed for planning or deploying a SharePoint 2010 farm.
Posted: 15 Jun 2011 | Published: 15 Jun 2011

DellEMC and Intel®

BranchCache in Windows 7 and Windows Server 2008 R2 Overview
sponsored by Microsoft Corporation India Pvt Ltd
WHITE PAPER: This document provides an overview of BranchCache, explains the different modes in which BranchCache operates, and describes how BranchCache is configured. The paper also explains how BranchCache works with Web servers and file servers and the steps BranchCache takes to determine that the content is up-to-date.
Posted: 17 Dec 2009 | Published: 14 Apr 2009

Microsoft Corporation India Pvt Ltd

Discount Tire Accelerates Its E-Commerce Business With Red Hat Satellite And IBM
sponsored by Red Hat and JBoss
CASE STUDY: In 2000, Discount Tire Company decided to bring management of its e-commerce infrastructure in-house after having outsourced it for several years. Learn how they turned to the rock-solid reliability of Red Hat's Enterprise Linux platform to handle the task of supporting their new e-commerce environment.
Posted: 28 Jul 2009 | Published: 28 Jul 2009

Red Hat and JBoss

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

WebSphere eXtreme Scale V7: Solutions Architecture (redbook)
sponsored by IBM
EBOOK: This paper is a follow-up to Users Guide to WebSphere eXtreme Scale, updating the architectural content for WebSphere eXtreme Scale V7.
Posted: 12 Oct 2010 | Published: 14 Dec 2009

IBM

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
sponsored by VeriSign EMEA
WHITE PAPER: This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement