Emerging Technologies  >  

Web 2.0

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Web 2.0 (or Web 2) is the popular term for advanced Internet technology and applications including blogs, wikis, RSS and social bookmarking. The two major components of Web 2.0 are the technological advances enabled by Ajax and other new applications such as RSS and Eclipse and the user empowerment that they support. Web 2.0 in the Enterprise: An Analyst's Perspective -- Click here to read the white  … 
Definition continues below.
Web 2.0White Papers (View All Report Types)
126 - 150 of 191 Matches Previous Page  | Next Page
Confidently maximize virtual investments with Integrated Service Management
sponsored by IBM
WHITE PAPER: IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

IBM

Controlling Web 2.0 Applications in the Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Three Must-Have’s to Securing the Social Web
sponsored by Websense, Inc.
WHITE PAPER: Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk
sponsored by Websense, Inc.
WHITE PAPER: Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

The Promises and Pitfalls of Social Media in the Legal Community
sponsored by iCONECT
WHITE PAPER: From personal brand building to professional practice, social media offers professionals a host of opportunities and pitfalls to drive success or failure. Access this white paper to learn about the legal considerations surrounding content on social media websites.
Posted: 16 Jun 2011 | Published: 09 Jun 2011

iCONECT

Nine Keys to Innovation Management 2.0
sponsored by Spigit
WHITE PAPER: Innovation is a hot topic right now, but it's never actually gone out of style. This paper highlights the nine keys to seizing the opportunity of Innovation Management 2.0.
Posted: 31 May 2011 | Published: 31 May 2011

Spigit

Unified Content Security in Practice
sponsored by Websense, Inc.
WHITE PAPER: Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention.
Posted: 03 May 2011 | Published: 03 May 2011

Websense, Inc.

Top 5 Reasons to move Lotus Notes apps to the cloud with Force.com
sponsored by Salesforce.com
WHITE PAPER: Many Lotus Notes customers realize it's not a matter of “if” but “when” their applications will be migrated to a modern Web infrastructure. This paper has five key reasons that more and more customers are choosing to move their Notes apps to the cloud with Force.com, including ease of use and integration.
Posted: 29 Apr 2011 | Published: 29 Apr 2011

Salesforce.com

Close Encounters of the Third Kind
sponsored by IBM
WHITE PAPER: This paper presents results of research performed by IBM into client-side JavaScript vulnerabilities using a JavaScript Security Analyzer (JSA), which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process.
Posted: 22 Mar 2011 | Published: 21 Mar 2011

IBM

Leveraging the Power of Social Media
sponsored by Oracle Corporation
WHITE PAPER: Download this free white paper and find out how to "Drive Sales Effectiveness with Enterprise-Ready Web 2.0Solutions," "Harvest Social Knowledge for Customer Service," and learn how "Social CRM Turns Customers into Competitive Advantage."
Posted: 21 Mar 2011 | Published: 03 Aug 2009

Oracle Corporation

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

3-Step-Migration: Microsoft Office 2003 to Oracle Open Office
sponsored by Oracle Corporation
WHITE PAPER: This brief paper is designed to assist IT professionals and system integrators who want to move an organization from Microsoft Office 97/2000/XP/2003 to Oracle Open Office. Continue reading to learn more.
Posted: 14 Feb 2011 | Published: 03 Jan 2011

Oracle Corporation

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

CIO Challenges: The Best Defense is a Good Offense
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn how CIOs are building a foundation for a much more agile business that holds the potential for working in a more flexible way and enabling faster innovation by actively evaluating and experimenting with newer technologies.
Posted: 22 Jan 2011 | Published: 22 Jan 2011

Oracle Corporation

How to Get the Cisco Tech Support You Need, Online
sponsored by Cisco Systems, Inc.
WHITE PAPER: IT and telecom staff in small businesses (up to 250 employees) meet up at what Google Analytics reports is one of the most popular support sites of its size—the Cisco Small Business Support Community. Whenever you need technical support, or want to learn more about your technology, connect with the community and get support. Read on to learn more.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

HP TruClient technology: Accelerating the path to testing modern applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper explores testing Web 2.0 applications and looks into reasons why traditional testing solutions aren’t a good fit for testing applications built with Ajax and other Web 2.0 technologies. It introduces the HP TruClient technology, and discusses how this revolutionary technology helps advance, accelerate, and simplify performance testing.
Posted: 17 Dec 2010 | Published: 16 Dec 2010

Hewlett-Packard Company

Business Process Management Solution Implementation Guide
sponsored by IBM
WHITE PAPER: The BPM Solution Implementation Guide, an IBM® Redpaper™, provides a practical approach to rapid Business Process Management solution delivery. It describes how to analyze, model, and manage processes in the context of a real healthcare scenario.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

IBM

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Websense, Inc.

Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or Train Wreck? (Spanish version)
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper for a discussion of the benefits and risks associated with the solution provided by the convergence of business process management, service-oriented architecture, and Web 2.0.
Posted: 27 Oct 2010 | Published: 28 Aug 2008

Oracle Corporation

Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or Train Wreck?
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper for a discussion of the benefits and risks associated with the solution provided by the convergence of business process management, service-oriented architecture, and Web 2.0.
Posted: 27 Oct 2010 | Published: 28 Aug 2008

Oracle Corporation

Slipping Through The Cracks Of Web Services To Serve Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Cloud-Based Web Security Isn’t Hype: It’s Here and It Works
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: What is news is that now you can protect your company’s valuable assets from web-based attacks with an innovative, effective new form of web security – cloud-based, reputation-driven defense. Read this paper to learn how.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

Take Back Control: Increase Security, Empower Employees, Protect the Business
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

IBM System x iDataPlex
sponsored by IBM
WHITE PAPER: In today’s fast-paced IT environment, overcrowded data centers are becoming more and more common—which means IT managers are simply running out of room to expand. An iDataPlex solution can help with these problems because its unique rack design is optimized to save floor space. Read this paper to find out more.
Posted: 20 Oct 2010 | Published: 19 Oct 2010

IBM
126 - 150 of 191 Matches Previous Page    4 5 6 7 8    Next Page
 
WEB 2.0 DEFINITION (continued): …  paperTim O'Reilly is generally credited with inventing the term, following a conference dealing with next-generation Web concepts and issues held by O'Reilly Media and MediaLive International in 2004. O'Reilly Media has subsequently been energetic about trying to copyright "Web 2.0" and holds an annual conference of the same name. There is, however, some dispute about whether O'Reilly is responsible for the original coinage. Joe Firmage, for instance, used Web 2.0 to describe using the World Wide Web as a platform in 2003.One of the most significant differences between Web 2.0 and the traditional … 
Web 2.0 definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement