Web Development

Improve your coding skills by putting our experts' web development advice to use.

  • White Papers // Aug 2014

    Infographic: Personal Devices at Work

    This infographic explores the implications of BYOD and how Google Apps for Business helps users work seamlessly across all the devices they choose to use. See the infographic here.

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Google Infographic: Personal Devices at Work

    This infographic explores the implications of BYOD and how Google Apps for Business helps to free people to work seamlessly across all the devices they choose to use.

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Google Enterprise for Manufacturing: Become a Connected Manufacturer

    This whitepaper notes that Google Apps offers a simple, affordable option to manufacturers struggling with the complexity and cost of other systems. Read this report and learn how Google Apps for Business helped organisations improved productivity.

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Google Enterprise For Manufacturing: Become a Connected Manufacturer

    This whitepaper notes that Google Apps offers a simple, affordable option to manufacturers looking to drive an increase in productivity. Read this report and learn how Google Enterprise products helps organisations innovate.

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Case Study: Kogan.com centralises IT infrastructure with Google Apps

    Read how Kogan.com, an online retailer of consumer electronics and lifestyle goods, was able to run their business using Google Apps seeing them through significant growth. Find out more by reading our case study.

    Sponsored By Google Apps for Business

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Sponsored By ShoreTel

  • White Papers // Jul 2014

    Three Key Principles to Accelerating Web Applications

    Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of...

    Sponsored By F5

  • Videos // Jul 2014

    Introduction to Operations Orchestration

    This video introduces HP’s Operations Orchestration software and shows how to build a very simple automation flow. Watch now and learn how easy it is to improve deployment time, manage scale, ensure consistency and increase the reliability of IT processes and workflows.

    Sponsored By HP

  • Research // Jul 2014

    Web Application Firewalls Are Worth the Investment for Enterprises

    Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications. Here, we explain how Web application firewalls help security leaders to better protect Web applications in their organizations. This Gartner report: Covers the major features of WAF technology...

    Sponsored By Imperva

  • Research // Jul 2014

    2014 Gartner Magic Quadrant for Web Application Firewalls

    Gartner, Inc. has released the 2014 Magic Quadrant for Web Application Firewalls. Imperva has been positioned as the Leader in this quadrant based on completeness of vision and ability to execute in the Web Application Firewall market. Register now to view the complete report.

    Sponsored By Imperva

  • Videos // Jul 2014

    Monitor and Protect Critical Web Applications with a Web Application Firewall

    Web applications are a prime target for hackers because they are easily accessible and can yield highly valuable data. Companies need to protect their websites, but without compromising performance. Imperva’s Web Application Security solutions continuously adapt to evolving threats, and enable security professionals, network managers, and application developers to mitigate...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Development Testing for Agile Enterprises

    Companies need to get their products to market faster to remain competitive and capitalize on market opportunity. Learn how the Coverity platform seamlessly integrates with Agile development methodologies and tools to help maximize development efficiencies.

    Sponsored By Coverity

  • Webcasts // Jul 2014

    Top 5 Things Every C# Developer Should Know

    C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how you can gain deeper intelligence into your code to avoid critical crash causing defects. C# has become increasingly popular and complex, putting applications and organizations at risk for software failures. Learn how...

    Sponsored By Coverity

  • White Papers // Jul 2014

    Using IBM Social Business to Take Your Business Relationships to the Next Level: A Game Changer for Small, Medium, and Large Businesses.

    This IBM Redguide™ publication provides information about IBM Social Business and includes details about the business need and the value of transformation to a social business. It presents a high-level Social Business component diagram, highlights key capabilities, and includes customer case studies that exemplify how some of these capabilities can...

    Sponsored By IBM

  • White Papers // Jul 2014

    Anticipate, engage and deliver exceptional web experiences.

    IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. IBM Customer Experience Suite features rich, integrated capabilities for managing web content, real-time social communications, robust...

    Sponsored By IBM

  • White Papers // Jul 2014

    IDC Report: The Future of eMail is Social

    This IDC white paper looks at the current state of enterprise email and perceived and real problems that surround its use. The paper discusses the changing nature of collaboration and work fueled by the social web by examining email trends and the emergence of new social collaboration tools. It reveals...

    Sponsored By IBM

  • White Papers // Jun 2014

    Qantas supports business transformation with CA Clarity On Demand

    Business: Qantas is Australia’s largest domestic and international airline, carrying nearly 20% of all passengers travelling in and out of the country. Challenge: to maintain its competitive advantage in the increasingly difficult aviation industry, Qantas embarked on a major transformation programme to position the company for a strong and sustainable...

    Sponsored By CA Technologies

  • White Papers // May 2014

    Making the Real Time Enterprise a Reality

    REAL TIME. ON DEMAND. ALWAYS ON. Such are the expectations of businesses in today’s global information economy. Customers demand agility, responsiveness, and innovation from all companies today. And they’re comparing their experiences with businesses in every industry against firms that embody all three capabilities. Read this whitepaper to discover how...

    Sponsored By SAP

  • White Papers // May 2014

    Gartner 2013 MarketScope Report for Web Access Management

    Industry analyst firm Gartner, Inc. reviews vendor solutions for Web Access Management (WAM). Download the Nov. 2013 Gartner report to learn: Emerging trends in WAM market; Typical WAM use cases and solutions; WAM vendor rankings and analysis

    Sponsored By IBM

  • White Papers // Apr 2014

    Six Things That Can Kill Your Website

    Your website is your shop front, your brand on display and an essential sales and marketing tool. You spent a lot of money building it and attracting visitors. It is business critical: it would be a disaster if that shop front were smashed, your reputation was tarnished and visitors stopped...

    Sponsored By Symantec

  • White Papers // Apr 2014

    Protect people, processes and technology from web appliation threats

    Incidents of web application security breaches that result in data theft are growing in frequency and severity, making it critical for organizations to take immediate steps to examine the security measures they have in place, assess vulnerabilities and act to protect their businesses.

    Sponsored By IBM

  • White Papers // Apr 2014

    U.S. Department of Agriculture Stays at the Forefront of Mobilization with Acronis Access

    The United States Department of Agriculture (USDA) works to support the American agricultural economy to strengthen rural communities; to protect and conserve America’s natural resources; and to provide a safe, sufficient, and nutritious food supply for the American people. The USDA is composed of 17 separate agencies with an additional...

    Sponsored By Acronis

  • White Papers // Apr 2014

    What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

    Web application attacks threaten nearly every organization with an online presence. While some security vendors contend that their next generation firewalls can stop Web attacks, these products lack essential Web security features, leaving customers exposed to attack. This white paper lays out the six key requirements needed to protect Web...

    Sponsored By Imperva

  • White Papers // Apr 2014

    10 Things Every Web Application Firewall Should Provide

    Securing Web applications against cybercriminals, hacktivists, and state-sponsored hackers is a never-ending effort. Hackers evade traditional network security defenses to take down websites and to steal data. Malicious users probe websites around-the-clock looking for vulnerabilities. Automation tools such as off-the-shelf attack toolkits and botnets make it...

    Sponsored By Imperva

  • White Papers // Apr 2014

    Office 365 – Bringing Enterprise-Class Cloud Email Capabilities to the Masses

    Learn how migrating to the Microsoft® Office 365 cloud-based messaging and collaboration solution can benefit your organization’s business-critical email infrastructure in terms of availability, functionality and cost savings in this webcast from Dell™.

    Sponsored By Dell Software

  • White Papers // Mar 2014

    Managing User Identities and Access in the Cloud

    This document describes how IBM can help clients design, deploy and manage critical identity and access management controls within cloud environments. IBM is a trusted partner with the broad portfolio and comprehensive security strategy required to enable secure innovation.

    Sponsored By IBM

  • White Papers // Jul 2014

    Ditch the documents and spreadsheets - Manage requirements efficiently and more accurately with IBM Rational DOORS Next Generation

    Using productivity tools for requirements management is like using a hammer to open a bottle. It gets the job done, but at what cost? IBM Rational DOORS NG offers effective requirements management capabilities by including the ability to capture relationships and manage dependencies.

    Provided By IBM

  • White Papers // Jul 2014

    Maximize your UC&C Outcomes

    Unified communications and collaboration (UC&C) solutions like Microsoft® Lync® are transforming the workplace. With presence, real-time voice, HD video, and rich collaboration capabilities seamlessly integrated into their office productivity suite, today’s employees can engage customers and connect with colleagues and partners from anywhere, at any time, using any device. Read...

    Provided By HP US

  • Downloads // Jun 2014

    Webroot protects your devices everywhere

    SecureAnywhere Endpoint Protection offers instantaneous protection and fast scans without the hassle of time-consuming patches and signature updates. You can get your free trial today - just click "download", fill out and submit the form, and we'll email you a download link and instructions. Then just go to your...

    Provided By Webroot Software

  • Downloads // Jun 2014

    Citrix NetScaler VPX - 90 Day Trial

    Try the Citrix NetScaler VPX for 90 days and see for yourself the benefits for web app acceleration, availability and security. Key benefits of NetScaler VPX Freedom to choose your platform - Virtual appliance runs on Citrix XenServer, Microsoft or VMware Simple to install and manage - The...

    Provided By Citrix

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US

  • Presentations // Jun 2014

    WebEx Viewpoints: Collaboration in the Workplace

    Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Improving Sales Teams

    WebEx enables sales teams to effectively and efficiently connect with customers around the globe. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Viewpoints: Training

    WebEx allows companies to train employees effectively, anytime and anywhere. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Presentations // Jun 2014

    WebEx Viewpoints: Hosting Webinars

    Use WebEx to host webinars, tell your story and connect to global audiences. Find out how companies are using WebEx to achieve outstanding results. Millions of users across the globe use WebEx to make stronger connections, complete projects faster, and reach more prospects, customers, and employees.

    Provided By Cisco Systems

  • Training // Jun 2014

    WebEx Tutorial: Key Features

    Learn how easy Webex Meetings makes hosting webinars, sharing screens and attending online meetings. Drive success by connecting with your audience and completing projects faster.

    Provided By Cisco Systems

  • White Papers // Jun 2014

    The New World of Collaboration

    The old world of collaboration—desktops, wired network connections, virtual private networks, and clunky software—has given way to a new world of collaboration. Today’s generation of mobile devices, wireless technologies, and cloud capabilities has had an inexorable and fundamental impact on how people work together and share information. Collaboration is now...

    Provided By Box

  • White Papers // Jun 2014

    Using Video to Gain a Competitive Advantage: A Business Strategy for Mid-Market Companies

    Video collaboration solutions can help small- to medium-sized companies reduce downtime by 25%. They can also help companies reduce time-to-market by 24%.* The ROI is strong for mid-market companies investing in video. This Cisco-sponsored white paper from AVI-SPL will help you plan a video-enabled workplace. Discover how video...

    Provided By AVI-SPL

  • White Papers // May 2014

    Recent Contributions to Cryptographic Hash Functions

    Hash functions are cryptography’s most widely used primitives, in that they are a fundamental building block used for a wide variety of constructions. The recent attacks of Joux, Wang, and others against the current generation of hash functions has stimulated a resurgence of research into these primitives as well as...

    Provided By Intel Corporation

  • Downloads // May 2014

    Simplify Desktop and Application Access Management – PowerTerm WebConnect

    With the current BYOD trend and the need to reduce IT workload, organizations need to empower users with secure, browser-based access to Windows Applications and Desktops from any device, anywhere - simply and cost-effectively. PowerTerm® WebConnect provides secure and mobile, managed access from office and remote locations to Windows...

    Provided By Ericom Software