Software  >   Systems Software  >   Middleware  >  

WSM

RSS Feed    Add to Google    Add to My Yahoo!
WSM Reports
 
SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

SearchSecurity.com University: Why SSL Certificate Security Matters
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn about specific methods used to exploit SSL and how to defend against them.
Posted: 21 Oct 2013 | Premiered: 24 Oct 2013

SearchSecurity.com

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

STATE OF DNS AVAILABILITY REPORT
sponsored by Verisign, Inc.
WHITE PAPER: View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Verisign, Inc.

Solution Summary  - Secure Cloud
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper describes how virtualization solves the issue of directory integration with an approach that is cost effective, non-intrusive, and easy to deploy. By externalizing identities into an interoperable service that can be accessed by a variety of applications, enterprises can deliver services to internal and external users at faster speeds.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers
sponsored by Red Hat and HP
WHITE PAPER: Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat and HP

Session Initiated Protocol (SIP): A Five-Function Control Protocol
sponsored by F5 Networks
WHITE PAPER: The intent of this paper is to offer the reader a basic understanding of the Session Initiated Protocol. SIP is the conduit that will bring together the enterprise and telecommunications to provide IP-based communications.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Service Oriented Architecture: A Practical Guide to Measuring Return on Investment
sponsored by IBM Software Group
WHITE PAPER: This investment analysis helps establish a benefits framework specific to SOA that focuses on limited choices and ways to depict the costs incurred.
Posted: 20 Jun 2007 | Published: 01 Oct 2006

IBM Software Group
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
WSM White Papers | WSM Multimedia | WSM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement