Web Application Software Reports

Download Citrix NetScaler VPX Express for Free!
sponsored by Citrix
SOFTWARE DOWNLOAD: Now you can get the ultimate Web app delivery solution in a flexible, dynamic and cost effective virtual appliance with Citrix® NetScaler® VPX. Simply download the NetScaler VPX Express edition, then deploy it across your existing infrastructure - anywhere, anytime, anyhow you need it.
Posted: 26 Oct 2009 | Premiered: 25 Oct 2009

Citrix

Introduction to crystalreports.com
sponsored by Business Objects
WEBCAST: Sharing reports over the Web is convenient and efficient, yet if it is not done securely, the information can be easily compromised. Attend this Webcast to learn how your business can instantly and securely deliver reports to improve productivity and ...
Posted: 16 May 2007 | Premiered: Apr 25, 2007

Business Objects

Get Lost in the Cloud With HANA
sponsored by TechTarget Search SAP
EBOOK: This three-part handbook helps users get to the heart of the SAP cloud strategy. Learn from freelance writer Chris Maxcer about SAP HANA cloud tools, how customers are reacting to the push to the cloud, and how SAP is responding to user concerns.
Posted: 28 Mar 2016 | Published: 24 Mar 2016

TechTarget Search SAP

New Considerations for Application Integration
sponsored by TheServerSide.com
EBOOK: This three-part guide explores how application integration practices are being shaken up in modern enterprises. View now to discover experts' thoughts on how NoSQL and microservices are advancing app integration middleware; why architects are giving application integration a REST; and more.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TheServerSide.com

Presentation Transcript: Platform-as-a-Service Changes Everything, Again! Visual PaaS is Here!
sponsored by TechTarget Data Center
PRESENTATION TRANSCRIPT: Sophisticated Visual PaaS offerings provide a unified environment that empowers both "hard-core programmers" as well as “citizen developers” to develop business applications. CIOs are seeing PaaS as a viable option to embrace "citizen developers" and make the transition from Information Technology to Business Technology.
Posted: 21 Sep 2011 | Published: 21 Sep 2011

TechTarget Data Center

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

Legacy IT Systems: Keep 'Em or Cut 'Em?
sponsored by TechTarget CIO
EZINE: How do you calculate the expiration date on your legacy IT systems? We explore the keep-vs.-cut dilemma in this issue of CIO Decisions.
Posted: 03 Mar 2015 | Published: 24 Feb 2015

TechTarget CIO

E-Book: Technical Guide on Web Application Firewalls
sponsored by TechTarget Security
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

TechTarget Security