Web Application Software Reports

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM

New Considerations for Application Integration
sponsored by TheServerSide.com
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TheServerSide.com

Web 2.0 at Work: Departmental Use Cases
sponsored by Oracle Corporation
WHITE PAPER: With the introduction of Web 2.0 technologies into your enterprise, you can greatly increase the value of your company's most important assets. Leading companies are harnessing Web 2.0 technologies and applying them to build their next-generation workplaces.
Posted: 03 Apr 2009 | Published: 01 Aug 2008

Oracle Corporation

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Zenoss Core: Open Source Enterprise Monitoring Platform
sponsored by Zenoss, Inc.
PRODUCT DEMO: Zenoss Core provides a single tool to give you comprehensive insight into your entire IT infrastructure including applications, servers, and network. All information and administration is presented via a web application.
Posted: 18 Dec 2007 | Premiered: 18 Dec 2007

Zenoss, Inc.

Legacy IT Systems: Keep 'Em or Cut 'Em?
sponsored by TechTarget CIO
EZINE: How do you calculate the expiration date on your legacy IT systems? We explore the keep-vs.-cut dilemma in this issue of CIO Decisions.
Posted: 03 Mar 2015 | Published: 24 Feb 2015

TechTarget CIO

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Get Lost in the Cloud With HANA
sponsored by TechTarget Search SAP
EBOOK: This three-part handbook helps users get to the heart of the SAP cloud strategy. Learn from freelance writer Chris Maxcer about SAP HANA cloud tools, how customers are reacting to the push to the cloud, and how SAP is responding to user concerns.
Posted: 28 Mar 2016 | Published: 24 Mar 2016

TechTarget Search SAP

Designing a Modern Enterprise Architecture
sponsored by Metavine
EGUIDE: In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Metavine

Customer Satisfaction with Application Delivery Controller Vendors
sponsored by Citrix
ANALYST REPORT: Enterprise Management Associates Report: "Customer Satisfaction with Application Delivery Controller Vendors" - shows how Citrix NetScaler beats F5 and Cisco in customer satisfaction. Discover why Citrix is superior in 16 out of 21 categories and tops the competition in Presales, Tech Support, Product, Technology, and Overall Business Value.
Posted: 07 Jun 2010 | Published: 01 Mar 2010

Citrix