Web Services (Software) Reports

Oracle IT Modernization Series Modernization: The Path to SOA
sponsored by Oracle Corporation
WHITE PAPER: IT organizations are under increasing pressure to reduce costs while at the same time increase their ability to react to ongoing business demands. To achieve this they need to take advantage of the cost savings and flexibility of a service-oriented architecture (SOA). Read this white paper to learn about more about SOA and its benefits.
Posted: 14 May 2009 | Published: 01 Aug 2008

Oracle Corporation

E-Book: SOA: Technical Opportunities, Social Challenges
sponsored by Progress
EBOOK: In this paper you will learn how SOA can directly influence the success of your business, which will result from your business’ ability to participate in these new, more dynamic, federated communities. Read on to learn how social orientation is driving both new SOA technology needs and management changes in how technology is delivered and governed.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

Progress

Coca-Cola Enterprises: Mobile Enterprise Supply Chain Integration
sponsored by Intel® Services
WEBCAST: Watch this webcast to discover how Coca-Cola Enterprises are customizing their IT through APIs.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

Intel® Services

Webroot Secure Anywhere Business - Mobile Protection
sponsored by OpenText Security Solutions
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

OpenText Security Solutions

SOA Best Practices in the Mobile Age
sponsored by IBM
EBOOK: Although SOA is seen as the foundation of a mobile development initiative, developing and deploying mobile apps requires more than just SOA. Read this expert book to learn how mobile broadband will affect app development, how SOA has changed as a result of mobile apps, and two unique approaches to mobile app development.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

IBM

Empowering the Business to Sense and Respond: Delivering Business Event Processing with IBM WebSphere Business Events
sponsored by IBM
WHITE PAPER: This paper addresses one of the critical IBM technologies for supporting agility and alignment, Business Event Processing (BEP).
Posted: 11 Nov 2009 | Published: 25 Jul 2008

IBM

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

E-Guide: Data Integration
sponsored by Oracle Corporation
EGUIDE: The SearchSOA.com E-Guide: Data Integration provides an expert overview of the role of data integration in SOA development. It discusses the prominent function of data services platforms (DSPs) in an SOA initiative and offers insight into the seven levels of loose coupling that architects should consider when developing this infrastructure.
Posted: 29 Jun 2010 | Published: 29 Jun 2010

Oracle Corporation

Information Security Magazine - March 2013
sponsored by TechTarget Security
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

TechTarget Security