Software  >   Systems Software  >   Middleware  >   ORB  >  

IIOP

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Internet Inter-ORB Protocol, Inter-Orb Internet Protocol
DEFINITION: IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet. IIOP is a critical part of a strategic industry standard, the Common Object Request Broker Architecture (CORBA). Using CORBA's IIOP and related protocols, a company can write programs that will be able to communicate with their  … 
Definition continues below.
IIOPReports
26 - 50 of 581 Matches Previous Page  | Next Page
Analyst Report: The Total Economic Impact of IBM Integration Bus
sponsored by IBM
WHITE PAPER: In this report from Forrester Research Inc., examine the potential ROI you could experience by investing in IBM's Integration Bus, compared to an open source enterprise service bus (ESB). View the results of Forrester's survey with a company that evaluated both products, and discover the benefits that Integration Bus offers.
Posted: 27 Jun 2014 | Published: 31 May 2014

IBM

Analyst's take: Force.com application drives faster development
sponsored by ComputerWeekly.com
WHITE PAPER: Nucleus analyzed existing Force.com application deployments and found an average of 4.9 times faster development.  End customers, developers, and ISVs experience more rapid time to value, lower cost, and greater ongoing flexibility.
Posted: 21 Oct 2011 | Published: 18 Feb 2011

ComputerWeekly.com

Application Platfrom Comparison: Red Hat JBoss Enterprise Application Platform and Oracle WebLogic Server Enterprise Edition
sponsored by Red Hat
WHITE PAPER: Both Red Hat's JBoss Enterprise Application Platform and Oracle's WebLogic Server are based on the Java EE specification v6, meaning they share a fair number of features. View this white paper to take a look at the similarities and differences between JBoss and WebLogic Server.
Posted: 16 Jul 2014 | Published: 31 Aug 2013

Red Hat

Are You Prepared for a Software Audit?
sponsored by CDW Corporation
WHITE PAPER: Access this white paper to uncover the key elements of a software End User License Agreements (EULA) audit. Click through to explore 5 ways software asset management (SAM) can help you ensure compliance.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CDW Corporation

Backup Software: Nine Must-Ask Questions
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 9 key questions to ask when shopping for backup software solutions. Learn how to accurately define your needs and expectations, and know what to look for to determine if a particular solution will meet them or not. Read on to learn more.
Posted: 24 Feb 2012 | Published: 24 Feb 2012

Iron Mountain

Better Software Management and More Secure Computers
sponsored by Dell, Inc. and Intel®
CASE STUDY: This whitepaper details the systems management solution that Princeton University selected to solve their three major IT problems.
Posted: 18 Jun 2014 | Published: 05 Dec 2013

Dell, Inc. and Intel®

Big Data at Work: Dispelling the Myths, Uncovering the Opportunities
sponsored by SAS
WHITE PAPER: In this white paper, Thomas Davenport separates fact from fiction when it comes to big data.
Posted: 10 Jul 2014 | Published: 03 Mar 2014

SAS

Agile Testing Quadrants: Guiding Managers and Team in Test Strategies
sponsored by IBM
EGUIDE: Read this e-guide to discover why a testing taxonomy such as the Agile testing quadrants is an effective tool for software teams undertaking this task.
Posted: 27 Dec 2012 | Published: 27 Dec 2012

IBM

Analyst Report: Forrester - Product innovation demands more flexible software delivery
sponsored by IBM
ANALYST REPORT: In September 2010, the IBM Corporation commissioned the Forrester Consulting group to conduct a study whose aim was to better understand the critical role software innovation plays in product development. Download the report to see the results.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Analyst: Gartner Report - Magic Quadrant for Integrated Quality Suite
sponsored by IBM
ANALYST REPORT: According to Gartner, vendors must demonstrate both "completeness of vision" and an "ability to execute" to be evaluated as a leader. Gartner's 2011 Magic Quadrant for Integrated Software Quality Suites evaluates IBM as a leader. Read the report to learn more.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

IBM

Application Integration: Infrastructure basics for real-world integrations
sponsored by IBM
EGUIDE: Read this expert e-guide to explore study results indicating how your peers are creating seamless interoperability within their extended IT environments. Also, discover recommendations from the analysts at Gartner and other leading firms regarding best practices for modern application integration.
Posted: 18 Dec 2012 | Published: 18 Dec 2012

IBM

Application Performance Management (APM) for TIBCO Users: Extending Visibility across Your TIBCO Infrastructure and Beyond
sponsored by SL Corporation
WHITE PAPER: TIBCO users may wish to expand IT monitoring and management beyond their TIBCO infrastructure.
Posted: 31 Oct 2008 | Published: 31 Oct 2008

SL Corporation

Applying Security Holistically from the Cloud
sponsored by CloudAccess
WHITE PAPER: Consult this informative white paper to learn how the paradigm has shifted to security that's developed, deployed and managed from the cloud. Learn how to implement a holistic security strategy to protect all data in the enterprise.
Posted: 05 Sep 2012 | Published: 05 Sep 2012

CloudAccess

Are you Agile Enough?
sponsored by IBM
WEBCAST: If you are using Open Source, doing Agile but not able to consistently meet project goals, and aren't sure what tools you need -- check out how Rational Team Concert can help. See how Rational Team Concert automates core Agile practices -- like consistent team collaboration, rapid response to change, and frequent delivery of [...]
Posted: 09 Sep 2009 | Premiered: Sep 9, 2009

IBM

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information
sponsored by ASG Software Solutions
WHITE PAPER: The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more.
Posted: 25 May 2010 | Published: 25 May 2010

ASG Software Solutions

Assuring Software Security Through Testing
sponsored by (ISC)2 UK Ltd
WHITE PAPER: This white paper offers key recommendations for software developers to test for quality and security assurance before releasing products to the market.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

(ISC)2 UK Ltd

Attachment Spam - The Latest Trend
sponsored by GFI Software
WHITE PAPER: This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software.
Posted: 18 Mar 2008 | Published: 01 Jan 2007

GFI Software

Auto-Snapshot Manager/ VMware® Edition: Automated, Integrated, And Scalable Protection Of Virtual Machines
sponsored by Dell, Inc.
PRODUCT LITERATURE: Auto-Snapshot Manager/VMware Edition (ASM/VE) is a unique and innovative data protection feature of the Dell EqualLogic™ PS Series iSCSI SAN that enables fast online backups and quick restores of VMware virtual machines and VMFS file systems.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Dell, Inc.

Automating System i Message and Resource Management
sponsored by Help/Systems
WHITE PAPER: Automated, centralized message control and resource monitoring can help you manage your System i more easily and with fewer staff. This white paper describes some of the tasks you’ll face, some tips to help you get started, and the benefits of automating your system management with Robot/CONSOLE.
Posted: 25 May 2010 | Published: 25 May 2010

Help/Systems

Automating Your Code Review: Moving to a SaaS Model for Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Today’s application has become the enterprise’s ‘‘new perimeter’’. With better network‐level security technology hardening the network perimeter, malicious attackers are now focusing their efforts to strike at the least defended points ‐ the application. Read on to learn about automating code review for greater application security.
Posted: 07 Jun 2010 | Published: 10 Feb 2009

Veracode, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Ballarat Grammar Secures BYOD with HP Sentinel SDN
sponsored by Hewlett-Packard Company
WHITE PAPER: In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.
Posted: 20 Sep 2013 | Published: 31 Aug 2013

Hewlett-Packard Company

Becoming More Energy Efficient
sponsored by IBM Software Group
WHITE PAPER: Watch this short video to learn what defines a true green data center. This initial Business First investigation report will help answer these questions -- what is a green data center and why do I need one?
Posted: 15 Feb 2008 | Published: 14 Feb 2008

IBM Software Group

Best Practices in Contract Management: How to Shrink Your Sales Cycle through Smart Contract Management
sponsored by SpringCM
WHITE PAPER: This white paper discusses the seven best practices in contract management. It's time for you to think about how to manage your contracts more effectively, close more deals, and get more cash. Learn how in this paper.
Posted: 16 Apr 2008 | Published: 11 Oct 2010

SpringCM

Beyond HA: The Middleware Factor in Rapid Services Deployment in Next-Generation Networks
sponsored by Enea
WHITE PAPER: This white paper examines the evolution of adoption commercial-off-the-shelf (COTS) middleware, including the criteria for what makes adoption more viable for the telecommunications industry.
Posted: 15 Sep 2008 | Published: 15 Mar 2008

Enea
26 - 50 of 581 Matches Previous Page    1 2 3 4 5    Next Page
 
IIOP DEFINITION (continued): …  own or other company's existing or future programs wherever they are located and without having to understand anything about the program other than its service and a name. CORBA and IIOP are competing with a similar strategy from Microsoft called the Distributed Component Object Model (DCOM). (Microsoft and the Object Management Group, sponsors of CORBA, have agreed to develop software bridges between the two models so that programs designed for CORBA can communicate with programs designed for DCOM.)CORBA and IIOP assume the client/server model of computing in which a client program always makes … 
IIOP definition sponsored by SearchCIO-Midmarket.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement