ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web 2.0 Research

  • Next-generation capabilities of enterprise application-aware firewalls

    Sponsored by: SonicWALL

    The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.

  • The Return of Web Caching: Bandwidth Savings, Network Resilience, and On-Demand Content Delivery in a Web 2.0 World

    Sponsored by: BlueCoat

    In this report you will learn: How the Internet has evolved as we have moved from Web 1.0 to Web 2.0, Dynamics of new Web affects on service providers, Challenges faced by access providers in developing markets, Mobile operator specific challenges and Emerging Web 2.0 Internet usage pattern impact.

  • How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility

    Sponsored by: SonicWALL

    This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.

  • Editorial Tip: Measuring the ROI of Social CRM: No easy task

    Sponsored by: Infor

    As more organizations invest in social channels, the question of value becomes increasingly important. In social media, ROI alone may not tell the value of the effort, and benefits to the business from the customer service approach could be gauged by a variety of factors. Uncover how to measure the real value of an investment in social CRM.

  • Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security

    Sponsored by: Tripwire, Inc.

    Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.

  • CIO Challenges: The Best Defense is a Good Offense

    Sponsored by: Oracle Corporation

    Read this white paper to learn how CIOs are building a foundation for a much more agile business that holds the potential for working in a more flexible way and enabling faster innovation by actively evaluating and experimenting with newer technologies.

  • How to Get the Cisco Tech Support You Need, Online

    Sponsored by: Cisco Systems, Inc.

    IT and telecom staff in small businesses (up to 250 employees) meet up at what Google Analytics reports is one of the most popular support sites of its size—the Cisco Small Business Support Community. Whenever you need technical support, or want to learn more about your technology, connect with the community and get support. Read on to learn more.

  • DataSheet: Rational Quality Manager

    Sponsored by: IBM

    IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.

  • E-Book: Next Steps and Trends in Enterprise Content Management Technology

    Sponsored by: SpringCM

    ECM is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations as they look to gain more value and insight from documents, emails, blogs etc. Through this e-book you will obtain an expert overview of ECM and an in-depth look at where this market is headed.

  • Slipping Through The Cracks Of Web Services To Serve Malware

    Sponsored by: Trend Micro, Inc.

    Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.

  • Cloud-Based Web Security Isn’t Hype: It’s Here and It Works

    Sponsored by: WatchGuard Technologies, Inc.

    What is news is that now you can protect your company’s valuable assets from web-based attacks with an innovative, effective new form of web security – cloud-based, reputation-driven defense. Read this paper to learn how.

  • Take Back Control: Increase Security, Empower Employees, Protect the Business

    Sponsored by: WatchGuard Technologies, Inc.

    Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.

  • IBM System x iDataPlex

    Sponsored by: IBM

    In today’s fast-paced IT environment, overcrowded data centers are becoming more and more common—which means IT managers are simply running out of room to expand. An iDataPlex solution can help with these problems because its unique rack design is optimized to save floor space. Read this paper to find out more.

  • E-Book: Leveraging Web 2.0 and Social Media in CRM Programs

    Sponsored by: SAP America, Inc.

    You’ve heard the buzz about Web 2.0 and social CRM, but where to start? In this eBook, find out more about Web 2.0 and social media in the context of CRM. Learn more about using Web 2.0 to build customer loyalty and get expert insight into the role that social CRM may play in the future.

  • Journal of Management Excellence: Organizing for Management Excellence

    Sponsored by: Oracle Corporation

    Many organizations have achieved dramatic performance improvements by sustaining a focus on strategy implementation. We have captured and codified a body of knowledge from these successful organizations that provides the foundation for an emerging professional function focused on the management of strategy.

  • E-Guide: How to build a toolset to avoid Web 2.0 security issues

    Sponsored by: TechTarget Security

    Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.

  • Your September Issue of Information Security Magazine– Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  • The IBM Strategy for Integrating Enterprise Content Management (ECM) and Collaboration

    Sponsored by: IBM

    This session will show you IBM's unique vision for the integration of ECM and collaborative content, and how IBM can help you leverage Web 2.0 and collaboration to get more out of your ECM solutions.

  • Web 2.0 @ Work: How CIOs Can Help Drive Business Returns by Improving Organizational Effectiveness

    Sponsored by: IBM

    Without access to historical information, organizations today would be severely limited in their ability to make informed, appropriate decisions regarding even the most basic aspects of their business. This whitepaper outlines the four keys to success and discusses the ROI of Web 2.0.

  • Collaboration to innovation: Leveraging Web 2.0 to Accelerate New Service Ideas

    Sponsored by: IBM

    This white paper is intended to provide service providers with IBM's point of view on the power of collaboration in a Web 2.0 environment and to introduce a new IBM solution that can help telecoms to use collaboration as a tool for enabling innovation.

  • eBook: Building a Business Case for Social CRM and Customer Communities

    Sponsored by: Sirius Computer Solutions

    Learn how to build a business case for social media outlets affecting customer relations and customer communities including Facebook and Twitter, as well as what social media means for CRM, best practices for managing online customer communities, and expert advice on implementing social media programs successfully.

  • E-Book: The Executive’s Guide to Contact Center Technology Planning

    Sponsored by: inContact

    In this e-book learn about emerging contact center technology trends and newer options like self-service technology, analytics and Web 2.0. Find out about 10 must-have technologies for the contemporary contact center. Learn how to select the best technology to meet your needs, and read expert advice for setting up contact center technology.

  • Successfully Mitigating Corporate Risk

    Sponsored by: AT&T Corp

    This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.

  • Time to Change: New Thoughts on Supporting Business Change

    Sponsored by: SAP America, Inc.

    Learn how a new, interconnected economy is forcing companies to manage an ever-growing information network -- and the best way to adopt new technologies to give you greater flexibility for faster growth while maintaining business integrity.

  • To Block or Not. Is that the Question?

    Sponsored by: Palo Alto Networks

    This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.