Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Smart Services

RSS Feed    Add to Google    Add to My Yahoo!
Smart Services Reports
 
Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

CW500: The technology behind the BBC's Olympics coverage (video version)
sponsored by ComputerWeekly.com
PRESENTATION: John Linwood Chief Technology Office at the BBC explains the "terrifying" challenge of providing live coverage of all events at the Olympics, in this presentation for Computer Weekly's 500 Club.
Posted: 31 Jul 2012 | Published: 25 Jul 2012

ComputerWeekly.com

Security and Trust: The Backbone of Doing Business Over the Internet
sponsored by Symantec Website Security Solutions
WHITE PAPER: Carefully managing consumers' sensitive information is an essential part of online transactions. This informative resource helps you learn how you can gain the trust of your customers and keep their valuable information safe.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Symantec Website Security Solutions

Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

PortalGuard

Successfully Move Your SAP Business Core to the Social Enterprise
sponsored by Salesforce
PRESENTATION TRANSCRIPT: Read this brief presentation transcript to learn how easy it is to get plugged into today's social, mobile business world by creating cloud apps that seamlessly integrate with your SAP applications and data.
Posted: 06 Feb 2012 | Published: 06 Feb 2012

Salesforce

Architecture Plan and Design Best Practices: Outputs, Interfaces, and Scheduling
sponsored by IBM
EGUIDE: Consult this expert e-guide for advice from Gartner Vice President Anne Thomas Manes and other IT professionals on architecture planning, design best practices, and new approaches to building services with service-oriented architecture (SOA).
Posted: 13 Mar 2014 | Published: 13 Mar 2014

IBM

Symantec Web Gateway 5.0 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.
Posted: 10 Jul 2012 | Premiered: 10 Jul 2012

Symantec Corporation

SOA Governance and Test Update
sponsored by IBM
EGUIDE: In this E-Guide, readers will hear from experts in the space (including well-known David Linthicum) around SOA governance and its relationship with lightweight, flexible enterprise architecture.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

IBM

Fujitsu Interstage Business Operations Platform
sponsored by Fujitsu
WHITE PAPER: Access this resource to learn about a Platform-as-a-Service (PaaS) offering that massively reduces the cost and disruption of change in your IT environment. Read on to learn how this technology provides the link between business operations and IT, so that systems are completely under control and you experience minimal risk.
Posted: 19 Jul 2013 | Published: 31 Dec 2012

Fujitsu

Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement