ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Services Research

  • How to be influential online

    Sponsored by: ComputerWeekly.com

    Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.

  • Web-facing applications: Security assessment tools and strategies

    Sponsored by: SearchSecurity.com

    Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.

  • Exploring new web browser security capabilities

    Sponsored by: SearchSecurity.com

    New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.

  • Cyber Vulnerability Index 2012

    Sponsored by: ComputerWeekly.com

    More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.

  • SOA governance breeds lightweight, flexible enterprise architecture

    Sponsored by: IBM

    In this E-Guide, readers will hear from experts in the space (including well-known David Linthicum) on putting SOA infrastructure and governance in place to significantly simplify the challenges associated with keeping IT flexible.

  • Can SOA Get More Flexible to Meet Complex Challenges?

    Sponsored by: IBM

    In this E-Guide, readers will hear from experts in the SOA space (including well-known David Linthicum) around SOA governance and its relationship with lightweight, flexible enterprise architecture.

  • How to Meet the Constraints of Mobile Development

    Sponsored by: Appcelerator

    Today's mobile application development landscape is marked by explosive growth in the variety of devices available to end users and in those users' expectations.  In this expert E-Guide find out how to meet the constraints of mobile devices by keeping a close eye on speed, reliability and user expectations.

  • SOA Governance and Test Update

    Sponsored by: IBM

    In this E-Guide, readers will hear from experts in the space (including well-known David Linthicum) around SOA governance and its relationship with lightweight, flexible enterprise architecture.

  • How The Burgiss Group Manages Business Risk with AppFirst

    Sponsored by: AppFirst

    This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!

  • Red Hat Enterprise Linux vs. Microsoft Windows Server 2008. Who wins?

    Sponsored by: Red Hat

    How does Red Hat Enterprise Linux stack up to the competition? This white paper offers an overview of Red Hat Enterprise Linux as compared to Microsoft Window Server 2008 in terms of scalability, operational costs, and more.

  • TotalJobs Group – Sitecore fills Web CMS vacancy at Totaljobs Group

    Sponsored by: Sitecore

    To empower non-technical business stakeholders and reduce the reliance on specialist developers, Totaljobs Group needed to select the right web content management system. View this case study to learn how they reduced development costs substantially by shifting the responsibility for managing website content.

  • Manchester City – Building a media-rich website with Sitecore

    Sponsored by: Sitecore

    Manchester City needed their football club's website to be content and media rich, up to date, informative for fans and convenient for payment transactions. A new website platform was integrated, and the result was an overwhelming success. Learn more in this case study.

  • CICS and SOA Architecture and Integration Choices

    Sponsored by: IBM

    In this comprehensive e-book, explore the ways in which IBM's CICS server offers support for SOA strategies and seamlessly connects with other IT environments. With this information, you can select, plan, and design strategies that integrate CICS applications as service providers and requesters.

  • Fujitsu Software Interstage Business Operations Platform: A foundation for Smart Process Applications

    Sponsored by: Fujitsu

    To enable business innovation and collaboration, you need a way to enhance your existing ERP systems. In this webcast, learn how Smart Process apps give you ERP agility, what you need to create them, and how a business operations platform can serve as a foundation for these Smart Process apps.

  • The Great Firewall of China? How to address the specific challenges of reaching China with your website

    Sponsored by: CDNetworks

    This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.

  • Fujitsu Interstage Business Operations Platform

    Sponsored by: Fujitsu

    Access this resource to learn about a Platform-as-a-Service (PaaS) offering that massively reduces the cost and disruption of change in your IT environment. Read on to learn how this technology provides the link between business operations and IT, so that systems are completely under control and you experience minimal risk.

  • Fujitsu Software Interstage Business Operations Platform

    Sponsored by: Fujitsu

    In today's marketplace, businesses need to enhance collaboration between business and IT - otherwise, misalignment can cause bottlenecks, inefficiency, poor use of resources. Watch this video to learn about a platform-as-a-service (PaaS) offering that improves IT-business collaboration for developing process-centric applications and services.

  • Bring Your Own Security to the Cloud

    Sponsored by: CenterBeam

    Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.

  • Open Source Integration Software in the Enterprise

    Sponsored by: Red Hat

    Check out this informative resource for key deployment criteria of open source software and learn how you can leverage open source software for a variety of integration projects, including data center integration, SOA initiatives, and middleware strategies.

  • SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers

    Sponsored by: Red Hat and HP

    Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity.

  • Information Security Magazine - March 2013

    Sponsored by: SearchSecurity.com

    This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  • SOA Best Practices in the Mobile Age

    Sponsored by: IBM

    Although SOA is seen as the foundation of a mobile development initiative, developing and deploying mobile apps requires more than just SOA. Read this expert book to learn how mobile broadband will affect app development, how SOA has changed as a result of mobile apps, and two unique approaches to mobile app development.

  • Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge

    Sponsored by: IBM

    This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting.

  • STATE OF DNS AVAILABILITY REPORT

    Sponsored by: Verisign, Inc.

    View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.

  • Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date

    Sponsored by: Webroot

    Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.

Browse by Report Type: Web Services White Papers | Web Services Multimedia | Web Services IT Downloads

See more topics related to: Web Services

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.