Dynamic Services Reports

The New Information Agenda: Do You Have One?
sponsored by IBM
WHITE PAPER: This white paper defines the information agenda; describes key considerations and best practices in creating and implementing an information agenda.
Posted: 14 May 2008 | Published: 01 Jan 2008

IBM

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g
sponsored by Oracle Corporation
WHITE PAPER: While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

Oracle Corporation

SOA Centers of Excellence: Preserving Order Amid Change
sponsored by Oracle Corporation
WHITE PAPER: There is only one good way to approach the adoption and facilitation of SOA and Web services, and that is to establish, right from the beginning, a corporate Center of Excellence to guide the revolution from making a compelling business case to putting in place a long-term solution for measuring and improving on every success.
Posted: 23 Dec 2009 | Published: 21 Mar 2008

Oracle Corporation

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Blue Coat WebFilter
sponsored by BlueCoat
DATA SHEET: Review this brief data sheet to learn how WebFilter helps prevent Internet attacks from spyware, phishing, peer-to-peer (P2P) traffic, viral content and more. WebFilter also includes Dynamic Real-Time Rating (DRTR), a patented technology that can instantly categorize Web sites when a user attempts to access them.
Posted: 14 May 2009 | Published: 31 Dec 2008

BlueCoat

How to Meet the Constraints of Mobile Development
sponsored by Appcelerator
EGUIDE: Today's mobile application development landscape is marked by explosive growth in the variety of devices available to end users and in those users' expectations.  In this expert E-Guide find out how to meet the constraints of mobile devices by keeping a close eye on speed, reliability and user expectations.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

Appcelerator

Running High Availability Drupal Websites with Acquia and AWS
sponsored by Acquia, Inc.
PRESENTATION TRANSCRIPT: While most companies have launched a website, many lack an implementation that will keep their site up and running during even the most critical times. Access this presentation transcript to discover how the right managed cloud service provider, infrastructure, resources, and on-demand support will maximize the effectiveness of your website.
Posted: 28 Jun 2012 | Published: 28 Jun 2012

Acquia, Inc.

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

TechTarget Security

How to be influential online
sponsored by TechTarget ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

TechTarget ComputerWeekly.com

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel