WWW Software Reports

Web 2.0 at Work: Departmental Use Cases
sponsored by Oracle Corporation
WHITE PAPER: With the introduction of Web 2.0 technologies into your enterprise, you can greatly increase the value of your company's most important assets. Leading companies are harnessing Web 2.0 technologies and applying them to build their next-generation workplaces.
Posted: 03 Apr 2009 | Published: 01 Aug 2008

Oracle Corporation

Get Lost in the Cloud With HANA
sponsored by TechTarget Search SAP
EBOOK: This three-part handbook helps users get to the heart of the SAP cloud strategy. Learn from freelance writer Chris Maxcer about SAP HANA cloud tools, how customers are reacting to the push to the cloud, and how SAP is responding to user concerns.
Posted: 28 Mar 2016 | Published: 24 Mar 2016

TechTarget Search SAP

Introduction to crystalreports.com
sponsored by Business Objects
WEBCAST: Sharing reports over the Web is convenient and efficient, yet if it is not done securely, the information can be easily compromised. Attend this Webcast to learn how your business can instantly and securely deliver reports to improve productivity and ...
Posted: 16 May 2007 | Premiered: Apr 25, 2007

Business Objects

Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
sponsored by Citrix
WHITE PAPER: Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
Posted: 19 Sep 2008 | Published: 07 Jun 2010

Citrix

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

E-Book: Technical Guide on Web Application Firewalls
sponsored by TechTarget Security
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

TechTarget Security

Arekibo- Ireland's Leading Digital Agency Saves 75% Development Time with Kendo UI
sponsored by Telerik
CASE STUDY: In this case study, learn how Arekibo, Ireland's leading digital consulting agency, succeeded in delivering a compelling web experience using HTML5 and JavaScript, while also saving 75% on development time.
Posted: 08 Oct 2013 | Published: 31 Dec 2012

Telerik

5 Styles of Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This paper looks at the historical development of BI applications and BI technology, and concludes that five common Styles of BI have evolved during the past decade - each style representing a certain characteristic usage.
Posted: 09 Jun 2008 | Published: 01 Jan 2002

MicroStrategy

What’s New in VMware ThinApp 4.6
sponsored by VMware, Inc.
WEBCAST: It is important to remember that Web-based applications pose compatibility issues similar to native applications because of the underlying technology components used to create and run them. Learn how utilizing the right software allows you to ensure legacy application compatibility with each successive browser or operating system update.
Posted: 25 Apr 2011 | Premiered: Apr 25, 2011

VMware, Inc.

Integrating Java EE applications and C-based implementations in WebSphere Application Server
sponsored by IBM
WHITE PAPER: This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.
Posted: 25 Apr 2012 | Published: 14 Mar 2012

IBM