Software  >   Systems Software  >   Server Software  >  

Web Servers

RSS Feed    Add to Google    Add to My Yahoo!
Web ServersReports
 
Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Advanced Encryption Standard New Instructions
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Intel conducted tests on Web servers serving encypted data to quantify the benefits of AES-NI and found that AES-NI reduced computational overhead of encyrption by 50 percent. Continue reading this paper to learn more about the tests and results.
Posted: 10 May 2010 | Published: 04 May 2010

Dell, Inc. and Intel®

How to Protect SharePoint - Why Common Practices Are Ineffective
sponsored by Marathon Technologies
WHITE PAPER: Learn how Marathon's everRun software is a proven alternative to the server farm model that provides complete SharePoint high availability.
Posted: 21 Oct 2008 | Published: 18 Oct 2008

Marathon Technologies

Simplify Sales Environments with the Web Commerce Pattern of the IBM PureApplication System
sponsored by IBM
VIDEO: Watch this brief video today to learn of a commerce pattern platform that allows organizations to quickly deploy commerce infrastructures and adjust capacity easily to accommodate peak usage. Learn how creating a highly stable environment will ensure optimal resource usage and minimize downtime to provide the best possible customer experience.
Posted: 14 Nov 2013 | Premiered: 21 May 2013

IBM

Five tips to reduce risk from modern web threats
sponsored by Sophos, Inc.
WHITE PAPER: User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos, Inc.

Rapid WebSphere Application Server Provisioning with WebSphere CloudBurst Appliance
sponsored by IBM
WHITE PAPER: This high level overview of the IBM WebSphere CloudBurst Appliance discusses current issues being faced in the information technology industry and how WebSphere CloudBurst addresses many of them.
Posted: 14 Oct 2010 | Published: 19 Feb 2010

IBM

First the Tick, Now the Tock: Next Generation Intel Microarchitecture - Nehalem
sponsored by Intel Corporation
WHITE PAPER: Read this paper and get a look at how the next generation microarchitecture's dynamically scalable and design-scalable features directly contribute to power efficiency and performance.
Posted: 03 Apr 2009 | Published: 02 Apr 2009

Intel Corporation

Faster PHP Through Java
sponsored by Caucho Technology
WHITE PAPER: Using benchmarks and code samples throughout to anchor the discussion, this paper explores how Quercus - Caucho's Java implementation of PHP - can perform faster than the standard Apache-based PHP both in synthetic benchmarks and real-world applications. The results are quite impressive.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Caucho Technology

The Definitive Guide to Windows Application Server and Backup 2.0 - Chapter 3: Whole Server Backups
sponsored by AppAssure Software, Inc.
WHITE PAPER: Ready to start ensuring solid backups in your environment, the Backup 2.0 way? That's what this chapter is all about, and what I call "whole server backups" is definitely the right place to begin. In this chapter, we'll discuss all the most common types of servers, what their native solutions look like, and assemble a Backup 2.0 wishlist.
Posted: 21 Sep 2009 | Published: 21 Sep 2009

AppAssure Software, Inc.

Malware Security Report: Protecting Your Business, Customers and Bottom Line
sponsored by VeriSign Australia
WHITE PAPER: This white paper will help you understand the threats from Malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible, as well as techniques administrators can use to detect them.
Posted: 06 Aug 2010 | Published: 06 Aug 2010

VeriSign Australia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement