Internet Software White Papers

(View All Report Types)
Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

How Does Ping Really Work?
sponsored by Global Knowledge
WHITE PAPER: The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

The Dirty Dozen: Preventing Common Application-Level Hack Attacks
sponsored by IBM
WHITE PAPER: This paper describes 12 of the most common hacker attacks and provides basic rules that you can follow to help create more hack-resistant Web applications.
Posted: 09 Sep 2009 | Published: 01 Dec 2007

IBM

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

Integrating Java EE applications and C-based implementations in WebSphere Application Server
sponsored by IBM
WHITE PAPER: This white paper offers key tips on how to successfully integrate Java-based applications deployed on WebSphere Application Server with C-based implementations by leveraging Java Native Interfaces (JNI). Discover the benefits of this platform and how it can simplify the process of creating, configuring and invoking shared libraries.
Posted: 25 Apr 2012 | Published: 14 Mar 2012

IBM

Protect Your Web Applications from the OWASP Top 10
sponsored by IBM
WHITE PAPER: Applications, mobile devices, cloud computing, and web APIs unlock tremendous business opportunities—however, they also open your systems up to a broader set of unknown users. In this resource, you'll learn the basics of securing your web applications from the OWASP Top 10.
Posted: 22 Jun 2015 | Published: 31 Aug 2012

IBM

5 Styles of Business Intelligence
sponsored by MicroStrategy
WHITE PAPER: This paper looks at the historical development of BI applications and BI technology, and concludes that five common Styles of BI have evolved during the past decade - each style representing a certain characteristic usage.
Posted: 09 Jun 2008 | Published: 01 Jan 2002

MicroStrategy

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
sponsored by Citrix
WHITE PAPER: This technical white paper shows you how the NetScaler VPX virtual appliance offers maximum physical, functional, and operational flexibility for delivering web apps. Learn how virtual application delivery controllers can unleash the power of a virtualized dynamic data center! Compliments of Citrix.
Posted: 08 Jun 2010 | Published: 08 Jun 2010

Citrix

Protect People, Processes, and Technology From Web Application Threats
sponsored by IBM
WHITE PAPER: This resource discusses the security challenges created by web applications and offers insight and advice to help you address these issues.
Posted: 05 Mar 2014 | Published: 30 Nov 2013

IBM