Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Messaging Application Program Interface

RSS Feed    Add to Google    Add to My Yahoo!
Messaging Application Program Interface Reports
 
Why Centralizing Microsoft Servers Hurts Performance
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: The impeccable business logic behind data center consolidation and server centralization can result in an unintended consequence - poor performance of vital applications. Read this white paper to learn how this can happen and how to avoid it.
Posted: 15 Aug 2006 | Published: 01 Mar 2006

Juniper Networks, Inc.

Email Management in Today's Regulatory Environment
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
WHITE PAPER: Many businesses use the Exchange email server because of its full feature set and integration with Microsoft Office via the Outlook email client. But Exchange has one glaring drawback - it is very difficult to restore messages, mailboxes, and other data. Ontrack® PowerControls™ for Microsoft® Exchange Server solves the problem..
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Ontrack® PowerControls™ by Kroll Ontrack

Tame Complexity with Product Line Engineering
sponsored by IBM
RESOURCE: Explore how strategic reuse and product line engineering (PLE) can improve data management throughout product development lifecycles. You'll discover how to reuse design data to increase organizational efficiency as well as how this new approach to PLE worked for an established manufacturing company.
Posted: 19 Sep 2016 | Published: 31 Jul 2015

IBM

Why Code Signing Is an Essential Website Security Feature
sponsored by Symantec
WHITE PAPER: Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, and also allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 28 Sep 2016

Symantec

The State of Cloud Computing
sponsored by Hewlett Packard Enterprise
EGUIDE: Cloud computing is the way of the future. As this technology continues to grow, there is debate surrounding the best approaches to utilizing the cloud computing, while basic and advanced skills are in high demand. Learn about the current state of cloud computing and what to expect in the near future.
Posted: 09 Aug 2016 | Published: 08 Aug 2016

Hewlett Packard Enterprise

The Value of IT Automation: 4 Case Studies
sponsored by Puppet
RESOURCE: This resource, featuring research by Gartner, explores how Walmart, Staples and 2 other brands have started to leverage DevOps practices. Find out how these businesses are enhancing automation for testing, configuration, continuous delivery, and more.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

Puppet

Integrate Applications, Services, and Devices Across All Environments
sponsored by Red Hat
WHITE PAPER: This resource highlights three organizations' journey to a truly connected enterprise. Learn how to connect and compose APIs on-premise or in the cloud for social networks, cloud services, logistics partners, the IoT, and more.
Posted: 23 Sep 2016 | Published: 23 Sep 2016

Red Hat

To Increase Downloads, First Instill Trust: Security Advantages of Code Signing
sponsored by Symantec
WHITE PAPER: Malware poses a serious threat to the mobile environment: malicious code can slip into app stores and become a threat to anyone who downloads them. Discover how code signing enables end users to take advantage of the ease and convenience of content distribution—without worrying about security consequences.
Posted: 28 Sep 2016 | Published: 31 Dec 2014

Symantec

Application Modernisation: The Essential Guide
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this guide, we look at how distributed systems have evolved to support more agile software development.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

The Devil's Right Hand: An Investigation on Malware-oriented Obfuscation Techniques
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series evaluates the role that obfuscation techniques play in malware and the importance of understanding their effectiveness.
Posted: 29 Jul 2016 | Published: 29 Jul 2016

ComputerWeekly.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement