Internet Software White Papers

(View All Report Types)
How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM

Advanced Load Balancing: 8 Must-have Features for Today's Network Demands
sponsored by Citrix
WHITE PAPER: Today’s web applications require more than simple load balancing. This white paper describes the 8 must-have features of a more comprehensive application delivery solution.
Posted: 19 Sep 2008 | Published: 07 Jun 2010

Citrix

5 Styles of Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This paper looks at the historical development of BI applications and BI technology, and concludes that five common Styles of BI have evolved during the past decade - each style representing a certain characteristic usage.
Posted: 09 Jun 2008 | Published: 01 Jan 2002

MicroStrategy

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

10 Ways You Can Improve Web App Performance
sponsored by SOASTA, Inc
WHITE PAPER: This resource counts down 10 issues that development and testing teams should consider in order to derive maximum performance from their Web applications.
Posted: 06 Jan 2014 | Published: 31 Dec 2013

SOASTA, Inc

Integrating Java EE applications and C-based implementations in WebSphere Application Server
sponsored by IBM
WHITE PAPER: This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.
Posted: 25 Apr 2012 | Published: 14 Mar 2012

IBM

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.