Software  >   Systems Software  >   Server Software  >  

Intranet Server Software

RSS Feed   
Intranet Server Software Reports
 
Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Case Study: How John Lewis Conquered the Web
sponsored by ComputerWeekly.com
BOOK: Bill Goodwin tells the inside story of John Lewis £40m website redevelopment project, assesses the technical and business challenges faced and its impact on the business.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

ComputerWeekly.com

WebSphere eXtreme Scale V7: Solutions Architecture (redbook)
sponsored by IBM
EBOOK: This paper is a follow-up to Users Guide to WebSphere eXtreme Scale, updating the architectural content for WebSphere eXtreme Scale V7.
Posted: 12 Oct 2010 | Published: 14 Dec 2009

IBM

Designing and Implementing a Medium Server Farm with SharePoint 2010
sponsored by DellEMC and Intel®
WHITE PAPER: This paper discusses key criteria and decision points for determining what server and storage hardware are appropriate for a medium-sized SharePoint Server 2010 farm. It offers guidelines and rules of thumb for determining how much storage space should be allocated, and when separate storage volumes are desirable.
Posted: 15 Jun 2011 | Published: 15 Jun 2011

DellEMC and Intel®

Malware Security Report: Protecting Your Business, Customers, and the Bottom Line
sponsored by VeriSign EMEA
WHITE PAPER: This white paper will help you understand the threat from malware and how it can impact your online business. You’ll learn about criminals’ motivations for distributing malware through the web and how they infect web servers to make distribution possible.
Posted: 18 Feb 2011 | Published: 18 Feb 2011

VeriSign EMEA

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g
sponsored by Oracle Corporation
WHITE PAPER: While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

Oracle Corporation

Faster PHP Through Java
sponsored by Caucho Technology
WHITE PAPER: Using benchmarks and code samples throughout to anchor the discussion, this paper explores how Quercus - Caucho's Java implementation of PHP - can perform faster than the standard Apache-based PHP both in synthetic benchmarks and real-world applications. The results are quite impressive.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Caucho Technology

Testing EJBs with JUnit
sponsored by Sybase, an SAP company
WHITE PAPER: This paper will introduce you to JUnit and how it can help make testing easier.
Posted: 02 Jun 2002 | Published: 24 Oct 2001

Sybase, an SAP company

An Introduction to Sharepoint 2010
sponsored by DellEMC and Intel®
WHITE PAPER: This paper provides an overview of common business use cases for which SharePoint is a good fit, introduces the services and functionality within SharePoint Server 2010, highlights key changes from MOSS 2007, and helps readers understand the terminology and concepts needed for planning or deploying a SharePoint 2010 farm.
Posted: 15 Jun 2011 | Published: 15 Jun 2011

DellEMC and Intel®

Integrating Java EE applications and C-based implementations in WebSphere Application Server
sponsored by IBM
WHITE PAPER: This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.
Posted: 25 Apr 2012 | Published: 14 Mar 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info