Application Architects White Papers

(View All Report Types)
IBM WebSphere Message Broker, Version 6.1 with IBM WebSphere Adapters: Communicating with Enterprise Information Systems
sponsored by IBM
WHITE PAPER: This white paper reveals how WebSphere® adapter nodes within IBM® WebSphere Message Broker V6.1 speed and simplify the tasks of creating integrated processes, resulting in greater productivity and lower cost.
Posted: 12 Feb 2009 | Published: 11 Feb 2009

IBM

Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server
sponsored by Veritas
WHITE PAPER: Learn about a comprehensive technology for customers that want quick recovery and off-host backup support. Eliminate backup windows, reduce the performance load on application servers, and quickly bring applications back online after data c...
Posted: 19 Nov 2007 | Published: 01 Mar 2007

Veritas

Project Management Network Diagram: A Tool for Understanding the PM Life Cycle
sponsored by Global Knowledge
WHITE PAPER: The Project Management Network Diagram (PM Network Diagram) provides a visual illustration of the project management life cycle (in terms of the chain of events that take place in a project).
Posted: 06 Jul 2006 | Published: 01 Jan 2005

Global Knowledge

The 2008 (ISC)2 Global Information Security Workforce Study
sponsored by ISC2
WHITE PAPER: Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide.
Posted: 03 Jun 2008 | Published: 03 Jun 2008

ISC2

7 Types of Hard CISSP Exam Questions and How to Approach Them
sponsored by Global Knowledge
WHITE PAPER: Learn about the seven types of hard questions you are likely to see on the CISSP examination and the best approaches for solving them.
Posted: 03 Apr 2006 | Published: 01 Mar 2006

Global Knowledge

Managing Storage: Trends, Challenges, and Options
sponsored by EMC Corporation
WHITE PAPER: With the explosion of data, storage environments are becoming more complex. Poorly designed storage infrastructures are putting companies at risk. Download this study to learn how storage managers built stronger storage management teams and environments.
Posted: 31 Jul 2006 | Published: 01 Jul 2006

EMC Corporation

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

WhyNoSQL - An Architect's Guide
sponsored by Couchbase
WHITE PAPER: Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.
Posted: 16 Dec 2022 | Published: 17 Dec 2022

TOPICS:  .NET
Couchbase

9 IBM Cloud Paks for app modernization and cloud efforts
sponsored by TechTarget ComputerWeekly.com
EGUIDE: It takes time, money and labour to modernize applications and workflows to use cloud environments. IBM brings a new dimension to cloud adoption with highly integrated solution stacks that can provide a range of typical workflows for business users. In this e-guide, learn how IBM Cloud Paks can help ease some challenges of application modernization.
Posted: 13 Apr 2022 | Published: 13 Apr 2022

TechTarget ComputerWeekly.com

The state of application modernization 2024
sponsored by Red Hat
EBOOK: This in-depth e-book explores how organizations are approaching application modernization. Key findings include positive attitudes, continued progress, and the growing use of AI to support modernization efforts. Read on to learn more about the strategies and challenges companies are facing on their modernization journeys.
Posted: 19 Sep 2024 | Published: 23 Sep 2024

Red Hat

Architecting the Network for an AI-powered World
sponsored by Panduit
ESG INFOGRAPHIC: AI adoption is driving network changes, with 90% of organizations recognizing networking's critical role in AI. Most plan to migrate GenAI workloads on-premises and use edge deployments. Tap into this Enterprise Strategy Group infographic now to see how AI is reshaping network architecture.
Posted: 18 Mar 2025 | Published: 19 Mar 2025

Panduit

Architecting the Network for an AI-powered World Ebook
sponsored by Panduit
ESG RESEARCH REPORT: As enterprises adopt AI and GenAI technologies, networks must evolve to support increased throughput, especially at the edge. Read this ESG research report to prepare your network for an AI-powered future.
Posted: 18 Mar 2025 | Published: 19 Mar 2025

Panduit

Application Security observability
sponsored by Contrast Security
INFOGRAPHIC: As the network perimeter extends everywhere users are, security must move with it and be in place at the point of access. Download this infographic to learn 16 key things about observability and how it can help secure remote access and build user trust.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

Ultimate IoT implementation guide for businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: IT administrators and CIOs considering an internet of things (IoT) deployment must have a thorough understanding of what the IoT is, how it operates, its uses, requirements, tradeoffs and how to implement IoT devices and infrastructures. In this e-guide, learn the requirements and use best practices for a successful deployment.
Posted: 22 Jun 2022 | Published: 22 Jun 2022

TechTarget ComputerWeekly.com

When to Adopt the Lift-and-Shift Cloud Migration Model
sponsored by New Relic
EGUIDE: This e-guide looks at the different ways of migrating apps to the cloud: re-architecting and "lift and shift" and which path an individual apps should take. Not all apps are created the same, and figuring out the correct approach could save an enterprise time and money.
Posted: 08 Feb 2021 | Published: 21 Jun 2016

New Relic

Aviatrix Systems Video 2
sponsored by Aviatrix Systems
WEBCAST: How can you simplify the security of your cloud applications while reducing costs? Watch this webcast, which features leaders from Aviatrix, to find out.
Posted: 04 Mar 2024 | Premiered: Mar 4, 2024

TOPICS:  .NET
Aviatrix Systems

Migration and Modernization Considerations for Your Application Platform
sponsored by Red Hat
ESG WHITE PAPER: This Enterprise Strategy Group white paper explores strategies for migrating and modernizing application platforms in multi-cloud environments, addressing budget allocation, skill gaps, technology stack optimization, and developer productivity. It highlights how Microsoft and Red Hat's solutions help organizations overcome challenges.
Posted: 17 Mar 2025 | Published: 17 Mar 2025

Red Hat

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

AWS & Cloud Adoption in Australia/NZ
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the key highlights from this year's AWS Summit Sydney, including AWS's take on machine learning and what Australia needs to do to find its innovation mojo.
Posted: 08 Feb 2021 | Published: 19 Apr 2018

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to secure and agile app development
sponsored by TechTarget ComputerWeekly.com
EGUIDE: As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
Posted: 02 Aug 2021 | Published: 02 Aug 2021

TechTarget ComputerWeekly.com

Application Performance Management: Improving service availability
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

TechTarget ComputerWeekly.com

A guide to developing modern mobile applications
sponsored by TechTarget ComputerWeekly.com
EBOOK: A key ingredient of eBusiness is the ability to offer customers the very best user experience, irrespective of whether they use a web browser, a mobile browser or a mobile app. In this guide, we explore the challenges organisations face in managing the numerous ways customers can transact with businesses.
Posted: 08 Feb 2022 | Published: 08 Feb 2022

TechTarget ComputerWeekly.com

Oracle - Autonomous computing that declines a special name
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.
Posted: 08 Feb 2021 | Published: 16 Nov 2018

TechTarget ComputerWeekly.com

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

The Value of Runtime Application with Self-Protection
sponsored by Contrast Security
PRODUCT OVERVIEW: Traditional application security solutions lack visibility into runtime vulnerabilities, leading to ineffective threat detection and high false positives. Contrast Protect runtime application self-protection (RASP) provides accurate, embedded protection that reduces operational burden on security teams. Read the solution brief to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

API Management: The role of APis in digital business transformation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces (APIs) are moving beyond the domain of software development. They offer a way for organisations to work closely with an extended ecosystem of business partners, who are able to build value-added software-powered products and services.
Posted: 08 Feb 2021 | Published: 09 Nov 2020

TechTarget ComputerWeekly.com

Upgrade or rework: Pathway to application modernisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: If there is one certainty in IT, it is that at some point, every shiny new application will become legacy. The tech sector is driven by a fast cadence of innovation, which means that last year's "must have" phenomenon quickly becomes stale and out-of-date. In this e-guide, we explore the different approaches to modernising outdated IT systems.
Posted: 27 Jul 2021 | Published: 27 Jul 2021

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to application modernisation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this 15-page buyer's guide, Computer Weekly investigates how organisations are approaching the modernisation, replatforming and migration of legacy applications. We look at the tools and technologies available, change management, and the use of APIs and containerisation to make legacy functionality to cloud-native applications.
Posted: 08 Feb 2021 | Published: 24 Apr 2020

TechTarget ComputerWeekly.com

Orchestrating Harmony between Middleware, Apps, and Operating Systems
sponsored by GigaSpaces Technologies Inc.
EGUIDE: In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.
Posted: 08 Feb 2021 | Published: 09 Nov 2016

GigaSpaces Technologies Inc.

WAF and RASP: Raising the bar for application protection
sponsored by Contrast Security
EBOOK: Explore how combining Web Application Firewall (WAF) and Runtime Application Self-Protection (RASP) can provide comprehensive security against known and unknown vulnerabilities. Learn how RASP's runtime monitoring offers deeper protection than WAFs alone. Read the full e-book to learn more.
Posted: 09 Jul 2024 | Published: 09 Jul 2024

Contrast Security

WAF and RASP: Raising the bar for application protection
sponsored by Contrast Security
EBOOK: Explore how combining Web Application Firewall (WAF) and Runtime Application Self-Protection (RASP) can provide comprehensive security against known and unknown vulnerabilities. Learn how RASP's runtime monitoring offers deeper protection than WAFs alone. Read the full e-book to learn more.
Posted: 18 Dec 2024 | Published: 18 Dec 2024

Contrast Security

A Computer Weekly buyer's guide to API management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.
Posted: 08 Nov 2022 | Published: 08 Nov 2022

TechTarget ComputerWeekly.com