Software  >   Applications Software  >   Internet Applications Software  >  

Web Application Software

RSS Feed    Add to Google    Add to My Yahoo!
Web Application Software Reports
 
Gartner: HTML5 and the journey to the modern web
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

ComputerWeekly.com

Accelerate Delivery of Web Applications with this Tool
sponsored by IBM
VIDEO: Watch this brief video for an overview of a software product that acts as a web application server -- providing a framework and middleware for Java-based web applications
Posted: 27 Jun 2014 | Premiered: 27 Jun 2014

IBM

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
sponsored by Citrix
WHITE PAPER: This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Posted: 08 Jun 2010 | Published: 08 Jun 2010

Citrix

Optimize Application Delivery for Global Deployment Of SAP® BusinessObjects™ Enterprise with Blue Coat Systems Acceleration
sponsored by BlueCoat
WHITE PAPER: Blue Coats SAP BusinessObjects Enterprise Software is a market leading Business Intellience solution, enabling customers to discover and share business insight for optimal decision making.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

BlueCoat

SDL Tridion Technical White Paper
sponsored by SDL Web Content Management Solutions Division
WHITE PAPER: This white paper describes how SDL Tridion architecture and technological choices help organizations achieve their business goals. This paper describes technology options for website deployment, SDL Tridion in an enterprise enviorment, and the main components of SDL architecture.
Posted: 19 Apr 2011 | Published: 19 Apr 2011

SDL Web Content Management Solutions Division

Web 2.0 at Work: Departmental Use Cases
sponsored by Oracle Corporation
WHITE PAPER: With the introduction of Web 2.0 technologies into your enterprise, you can greatly increase the value of your company's most important assets. Leading companies are harnessing Web 2.0 technologies and applying them to build their next-generation workplaces.
Posted: 03 Apr 2009 | Published: 01 Aug 2008

Oracle Corporation

Introduction to crystalreports.com
sponsored by Business Objects
WEBCAST: Sharing reports over the Web is convenient and efficient, yet if it is not done securely, the information can be easily compromised. Attend this Webcast to learn how your business can instantly and securely deliver reports to improve productivity and ...
Posted: 16 May 2007 | Premiered: Apr 25, 2007

Business Objects

IBM ILOG Elixir Enterprise
sponsored by IBM
PRODUCT OVERVIEW: IBM ILOG Elixir Enterprise extends the Adobe Flex and Adobe AIR platforms by adding user interface controls for more intuitive, interactive displays. It provides a full spectrum of advanced graphical displays for the most demanding line-of-business applications. View this page to learn more about the product and access a 90-day trial.
Posted: 20 Dec 2011 | Published: 20 Dec 2011

IBM

Limelight OrchestrateTM Performance - Technical Specifications
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper details exactly how to ensure that the delivery of your websites and web-based applications is fast, agile, and optimized.
Posted: 06 Nov 2013 | Published: 06 Nov 2013

Limelight Networks, Inc.

Web Exploits: There’s an App for That
sponsored by M86 Security
WHITE PAPER: The main motivation driving the cybercrime industry is the possibility of monetary gain. Savvy, knowledgeable individuals with skills in developing Web applications and basic knowledge in hacking have filled a niche by creating exploit kits. Read this white paper to learn the basics about exploit kits, what they do, and why the bad guys use them.
Posted: 27 May 2010 | Published: 27 May 2010

M86 Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement