Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Web Services (Software)

RSS Feed    Add to Google    Add to My Yahoo!
Web Services (Software)Multimedia (View All Report Types)
 
Securing Web Services with HID
sponsored by HID
VIDEO: This quick video provides a few case studies concerning an active authentication system that leverages cloud-based threat detection to provide secure access to web-based apps and keep critical end-user information safe.
Posted: 23 Oct 2014 | Premiered: 23 Oct 2014

HID

Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation
sponsored by Intel
WEBCAST: This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.
Posted: 14 Feb 2011 | Premiered: Oct 13, 2010

Intel

Actuate Rich Information Applications Platform Tour
sponsored by Actuate
SOFTWARE DEMO: Discover how Actuate enables organizations to make interactions and service a better, more convenient experience for their customers.
Posted: 07 Jan 2008 | Premiered: 03 Jan 2008

Actuate

Mobile Middleware 101
sponsored by Appcelerator
WEBCAST: In order to meet the new requirements of middleware for mobile development, many companies are turning to mobile Backend-as-a-Service (mBaaS). Watch this informative webcast to explore the requirements, capabilities, and benefits of mBaaS now.
Posted: 28 Oct 2013 | Premiered: Oct 28, 2013

Appcelerator

Business-to-Business Data Integration in a SOA World
sponsored by Progress DataDirect
PODCAST: ZapThink, a leading IT advisory and analysis firm for XML, Web Services, and Service Orientation technologies, has released a new podcast on Business-to-Business Data Integration in a SOA World.
Posted: 31 Jul 2008 | Premiered: Jan 1, 2007

Progress DataDirect

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

Coca-Cola Enterprises: Mobile Enterprise Supply Chain Integration
sponsored by IntelĀ® Services
WEBCAST: Watch this webcast to discover how Coca-Cola Enterprises are customizing their IT through APIs.
Posted: 16 Apr 2014 | Premiered: Apr 16, 2014

IntelĀ® Services

Unleashing XQuery's Power
sponsored by Progress DataDirect
PODCAST: This podcast explains how XQuery can be a powerful tool for data integration within the Service-Oriented Architecture.
Posted: 31 Jul 2008 | Premiered: Jul 1, 2008

Progress DataDirect

Enable Mobile in the API Economy
sponsored by IBM
VIDEO: To achieve success with APIs, you need to manage both their creation and consumption -- but how? Find out in this brief video, where you'll discover a combination of tools that help you through the entire process: from API creation to mobile app development, and synchronization with back-end systems.
Posted: 13 Mar 2014 | Premiered: 13 Mar 2014

IBM

Microsoft Dynamics GP Enterprise
sponsored by Microsoft
SOFTWARE DEMO: Receive a free demo from Microsoft Dynamics GP (formerly Microsoft Business Solutions - Great Plains), a comprehensive business-management solution built on the highly scalable and affordable platform of Microsoft technologies.
Posted: 01 Jun 2007 | Premiered: 01 Jun 2007

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement