Web Services (Software) Reports

Audi fine-tunes its digital performance to boost online car sales
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the digital chief at Audi UK discusses how the car maker is tackling the slump in new car sales. One of the largest global malware botnets has been taken down, but how much of a blow will it be for cyber criminals? And we hear how one county council made huge savings on its SAP installation. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Feb 2021

TechTarget ComputerWeekly.com

Oracle IT Modernization Series Modernization: The Path to SOA
sponsored by Oracle Corporation
WHITE PAPER: IT organizations are under increasing pressure to reduce costs while at the same time increase their ability to react to ongoing business demands. To achieve this they need to take advantage of the cost savings and flexibility of a service-oriented architecture (SOA). Read this white paper to learn about more about SOA and its benefits.
Posted: 14 May 2009 | Published: 01 Aug 2008

Oracle Corporation

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

TechTarget Security

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

APIs Drive Opportunity Explosion
sponsored by Intel® Services
WHITE PAPER: Learn how leading UK retailer, Argos, increased sales by via mobile apps by 125% by leveraging a robust API management platform.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

Intel® Services

How to Automate HTML5 Testing
sponsored by SmartBear Software
WEBCAST: This webcast is designed to address development teams' testing questions when it comes to HTML5. Then learn how to effectively automate your HTML5 testing to ensure a more efficient and timely process.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Fujitsu Software Interstage Business Operations Platform
sponsored by Fujitsu
VIDEO: In today's marketplace, businesses need to enhance collaboration between business and IT - otherwise, misalignment can cause bottlenecks, inefficiency, poor use of resources. Watch this video to learn about a platform-as-a-service (PaaS) offering that improves IT-business collaboration for developing process-centric applications and services.
Posted: 19 Jul 2013 | Premiered: 23 Oct 2012

Fujitsu

The New Information Agenda: Do You Have One?
sponsored by IBM
WHITE PAPER: This white paper defines the information agenda; describes key considerations and best practices in creating and implementing an information agenda.
Posted: 14 May 2008 | Published: 01 Jan 2008

IBM

What to Do When You Have an IP Address but No Internet Connection
sponsored by Global Knowledge
WHITE PAPER: When we have an IP address but can't connect to the Internet, we need basic troubleshooting skills to verify both connections and configuration. Download this resource to learn about the local network, parts of IP addressing, and DHCP basics for resolving these types of connectivity issues.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Information Security Magazine - March 2013
sponsored by TechTarget Security
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

TechTarget Security