Java Server Faces White Papers

(View All Report Types)
Embracing Enterprise Mobility: Choosing the Right Application Development Platform
sponsored by IBM
WHITE PAPER: Extending your enterprise with mobile applications and device isn't an option anymore -- it's a necessity. But choosing the right platform for mobile application development isn't simple, when there are so many options on the market. Download this buyer's checklist for mobile application platforms to help you with your decision.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

IBM

Project Management and Collaborative Communication
sponsored by Tasktop
WHITE PAPER: This white paper explores how to create a connected software lifecycle to overcome data silos and enable end-to-end visibility for project management. Learn how to connect information across teams and departments to enhance project collaboration and create the communication that digital transformations, Agile, and DevOps principles demand.
Posted: 14 Mar 2017 | Published: 14 Mar 2017

Tasktop

Release and Deploy for the Complex, Multi-platform Enterprise
sponsored by OpenMake Software
WHITE PAPER: Application release and deploy in today's multi-platform enterprise can quickly become costly, chaotic, and error-prone. However, if you can centralize the management, configuration, and reuse of release and deployment processes, you can eliminate those issues for good.
Posted: 30 May 2014 | Published: 29 May 2014

OpenMake Software

5 Unsung Tools of DevOps
sponsored by New Relic
WHITE PAPER: Forward-thinking organizations have already hopped on the DevOps bandwagon for streamlined software development and delivery. A key aspect of successful DevOps is constant improvement of tools -- but improvement doesn't need to mean replacement. Are you overlooking some of the most valuable DevOps tools?
Posted: 18 Feb 2014 | Published: 31 Oct 2013

New Relic

Improve Your Mobile Application Security
sponsored by IBM
WHITE PAPER: Mobile applications bring with them a whole slew of security concerns that must be addressed throughout the development and deployment process. This helpful white paper introduces a mobile application development platform that helps you tackle security issues on devices, over the network, in the enterprise, and within the application itself.
Posted: 06 May 2014 | Published: 31 Oct 2012

IBM

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Red Hat JBoss Business Rules Management System: Best Practices Guide
sponsored by Red Hat
WHITE PAPER: In this informative technology detail, discover best practices for development with Red Hat JBoss business rules management system. It will focus on three key areas of rules development: rule authoring, designing the domain or fact model and various aspects related to rule execution.
Posted: 07 Jun 2013 | Published: 31 Dec 2012

Red Hat

Eliminate SLDC bottlenecks with a DevOps approach
sponsored by IBM
WHITE PAPER: In this resource, explore the bottlenecks that slow down software delivery and learn how you can overcome them by creating better collaboration through DevOps. Get an in-depth look at how to achieve the continuous release and deployment adoption path to DevOps, with specific examples of each step in the process.
Posted: 27 Mar 2014 | Published: 31 May 2013

IBM

Determining the Most Effective Endpont Management
sponsored by IBM
WHITE PAPER: This white paper details the need for a centralized endpoint management system that helps maximize business performance through quicker software deployment and maintaining compliance.
Posted: 09 Sep 2013 | Published: 31 May 2013

IBM

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.