ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web 2.0 Research

  • Expanding Information Access Initiatives with Embedded Enterprise Search

    Sponsored by: Vivisimo, Inc.

    This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications.

  • Using Social Search to Drive Innovation through Collaboration

    Sponsored by: Vivisimo, Inc.

    This paper, will try to help you strike a balance between solid business thinking and explosive enthusiasm for any new technology option with 2.0 in the description. Our goal is to give you a new way of looking at old challenges.

  • Presentation Transcript: Considerations for IT

    Sponsored by: Google Apps

    Read this transcript of the 'Considerations for IT' podcast to learn why companies have chosen Google Apps to improve their IT infrastructures. Learn which technical and business factors drove one company to adopt this technology. Determine how this technology can be used in your IT environment to improve Web application performance.

  • E-Book: Protecting Against Web Threats

    Sponsored by: TechTarget Security

    Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.

  • Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies

    Sponsored by: Sun Microsystems, Inc.

    Social technologies, commonly called Web 2.0, were originally used to describe consumer technologies that enable groups to organize and share information and media. But enterprises quickly caught on to the value of these easy-to-use tools for capturing and sharing ad hoc information that may otherwise not be documented.

  • Corporate networks: Business 2.0 and beyond

    Sponsored by: SonicWALL

    The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.

  • SharePoint E-Zine Volume 15: Top Five SharePoint Challenges and Solutions

    Sponsored by: TechTarget Search Windows Server

    Having some issues with SharePoint? It happens. This issue describes some of SharePoint's most common problems and provides the fixes to solve them. Also in this issue, get some pointers on how to manage external data access as part of your governance plan, and weigh the pros and cons of SharePoint social computing.

  • Presentation Transcript - Best Practices: Protect Your Online Revenue Through Web Performance Testing

    Sponsored by: Gomez

    This transcript will discuss optimizing application performance and quality, and various strategies that IDC sees in its research to help you improve your decision making about how you approach quality, management and performance optimization. Read on to learn more about how to protect your online revenue through web performance testing.

  • Download the Fall 2009 edition of Perform Magazine

    Sponsored by: Actuate

    Download Perform today for informative and insightful articles including how open source is changing the face of enterprise software, tips from the field on how to ignite enterprises to reach new levels of performance excellence, and deliver unmatched insight to users.

  • E-Book: Taking Action on Analytics - Using Data for Customer Loyalty and Retention

    Sponsored by: Infor CRM

    In this E-Book, hear from analysts and experts about recent trends in customer data and learn how winning organizations are truly taking action on analytics. Learn about the challenges that many organizations face when establishing and maintaining customer data management and retention programs and how to meet those challenges head on.

  • The Best of Both Worlds: How to Effectively Leverage Social Media Relationships with Real-Time Collaboration Tools

    Sponsored by: Citrix Online

    This eBook explores how organizations can connect and nurture relationships with prospects and customers by effectively leveraging social media and real-time collaboration tools.

  • When Web 2.0 Becomes Security Risk 2.0

    Sponsored by: Kaspersky

    Cyber-criminals are targeting web surfers on popular social networking sites like Facebook, LinkedIn and MySpace. This security brief discusses how to protect against "trusted" friends turned hostile hackers, pinpoint vulnerabilities in files, widgets and social sites, employ web application firewalls and use content filtering to mitigate risk.

  • Business Communication Tools for Tough Times

    Sponsored by: Cisco Systems, Inc.

    Small businesses in particular have to do more with less, without compromising the ability to deliver quality products and services to their customers. Unified communications and Web 2.0 collaboration tools can help your employees be more productive right from their desktops, simply, easily, and cost-effectively.

  • Preparing for the Web 2.0 World: How Enterprises Need to Think About Emerging Social Technologies

    Sponsored by: Sun Microsystems, Inc.

    IDC expects that the significant adoption of Enterprise 2.0 technologies in the enterprise will have a dramatic impact on how organizations capture, discuss, distribute, and protect their information. If companies are not already planning for this change, they will find themselves increasingly exposed and vulnerable.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Security Threat Report: July 2009 Update

    Sponsored by: Sophos

    Businesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.

  • Whitepaper: How to Segregate & Load Balance 10G Traffic to 1G Tools

    Sponsored by: Gigamon

    Check out this brief paper to learn how using a Data Access Switch with multi-rule mapping feature to share the load among multiple parallel processing Gigabit tools, 10-Gig network can be monitored comprehensively and cost-effectively.

  • Driving Revenue and Increasing Value with Application Performance Management

    Sponsored by: BlueCoat

    As a leading provider of solutions for Service Providers, Blue Coat appliances give you the visibility, acceleration and security needed for optimizing your network. Read this e-book to learn how Blue Coat gives you the control you need to deliver a whole set of new managed services for your business and consumer customers.

  • Web 2.0 and Sales Process Management

    Sponsored by: Oracle Corporation

    How can Web 2.0 systems and applications support management of sales processes? Read this white paper to find out!

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.