Emerging Technologies  >  

Web 2.0

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Web 2.0 (or Web 2) is the popular term for advanced Internet technology and applications including blogs, wikis, RSS and social bookmarking. The two major components of Web 2.0 are the technological advances enabled by Ajax and other new applications such as RSS and Eclipse and the user empowerment that they support. Web 2.0 in the Enterprise: An Analyst's Perspective -- Click here to read the white  … 
Definition continues below.
Web 2.0Reports
201 - 225 of 303 Matches Previous Page  | Next Page
Confidently maximize virtual investments with Integrated Service Management
sponsored by IBM
WHITE PAPER: IBM IT service management solutions help control costs, enhance performance and increase security in the virtual environment, with software for IT provisioning, IT monitoring, virtual storage, IT security, usage and accounting, software license management and more.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

IBM

Expert Guide to web 2.0 Threats: How to Prevent an Attack
sponsored by ArcSight, an HP Company
EGUIDE: A majority of today’s organizations already leverage the benefits of Web 2.0 technologies, or at least wonder how they can take advantage of it. This expert e-guide provides an overview of what Web 2.0 really is and explains how to combat the myriad of threats that accompany this convenient technology.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

ArcSight, an HP Company

Controlling Web 2.0 Applications in the Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Three Must-Have’s to Securing the Social Web
sponsored by Websense, Inc.
WHITE PAPER: Social Web has emerged as a valuable business tool for innovative organizations to engage with customers and stay competitive. But among the popularity comes great risk, as these networks can be targets for cybercriminals. View this paper to explore the 3 crucial measures to take in order to provide safe and productive use of this great resource.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Critical Data at Risk
sponsored by Websense, Inc.
WHITE PAPER: Organizations today are integrating platforms such as Facebook, LinkedIn, and Twitter as a way to engage with customers and capitalize on marketing opportunities. However, these social networks are targets for  cybercriminals. View this paper to explore the oportunities and risks of social networking and learn best practices for ensuring security.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.

E-Guide: Building a Security Toolkit to Protect Against the Latest Web 2.0 Threats
sponsored by BlueCoat
EGUIDE: This expert e-guide provides an in-depth overview of the latest Web 2.0 security threats and offers technical advice on how to defend against them.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

BlueCoat

Taking Mobile CRM Beyond the Sales Force
sponsored by SAP America, Inc.
EBOOK: The success of consumer-friendly smart phones has changed the game. People are bringing their iPhones and Droids to IT asking for CRM functionality.
Posted: 11 Jul 2011 | Published: 11 Jul 2011

SAP America, Inc.

The Promises and Pitfalls of Social Media in the Legal Community
sponsored by iCONECT
WHITE PAPER: From personal brand building to professional practice, social media offers professionals a host of opportunities and pitfalls to drive success or failure. Access this white paper to learn about the legal considerations surrounding content on social media websites.
Posted: 16 Jun 2011 | Published: 09 Jun 2011

iCONECT

Evaluate: IBM Rational AppScan
sponsored by IBM
TRIAL SOFTWARE: With Web applications exposing more sensitive information to anyone with an Internet connection, new security threats are emerging all of the time. IBM Rational AppScan is a leading application security testing suite designed to help manage vulnerability testing throughout the software development life cycle.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Nine Keys to Innovation Management 2.0
sponsored by Spigit
WHITE PAPER: Innovation is a hot topic right now, but it's never actually gone out of style. This paper highlights the nine keys to seizing the opportunity of Innovation Management 2.0.
Posted: 31 May 2011 | Published: 31 May 2011

Spigit

E-Guide: Next Steps and Trends in Enterprise Content Management
sponsored by Dell, Inc.
EBOOK: Enterprise content management is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations. This eBook provides an overview of ECM, a recap of recent developments in the market and an in-depth look at emerging management trends.
Posted: 27 May 2011 | Published: 27 May 2011

Dell, Inc.

Unified Content Security in Practice
sponsored by Websense, Inc.
WHITE PAPER: Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention.
Posted: 03 May 2011 | Published: 03 May 2011

Websense, Inc.

Top 5 Reasons to move Lotus Notes apps to the cloud with Force.com
sponsored by Salesforce.com
WHITE PAPER: Many Lotus Notes customers realize it's not a matter of “if” but “when” their applications will be migrated to a modern Web infrastructure. This paper has five key reasons that more and more customers are choosing to move their Notes apps to the cloud with Force.com, including ease of use and integration.
Posted: 29 Apr 2011 | Published: 29 Apr 2011

Salesforce.com

Technical guide on Web Security Gateways
sponsored by M86 Security
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

M86 Security

Agile Development with IBM Rational Synergy and IBM Rational Team Concert
sponsored by IBM
WEBCAST: See how to take advantage of these RTC and Jazz features with Synergy and Change source control and change management.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

IBM

Close Encounters of the Third Kind
sponsored by IBM
WHITE PAPER: This paper presents results of research performed by IBM into client-side JavaScript vulnerabilities using a JavaScript Security Analyzer (JSA), which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process.
Posted: 22 Mar 2011 | Published: 21 Mar 2011

IBM

Leveraging the Power of Social Media
sponsored by Oracle Corporation
WHITE PAPER: Download this free white paper and find out how to "Drive Sales Effectiveness with Enterprise-Ready Web 2.0Solutions," "Harvest Social Knowledge for Customer Service," and learn how "Social CRM Turns Customers into Competitive Advantage."
Posted: 21 Mar 2011 | Published: 03 Aug 2009

Oracle Corporation

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Next-generation capabilities of enterprise application-aware firewalls
sponsored by SonicWALL
EGUIDE: The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

The Return of Web Caching: Bandwidth Savings, Network Resilience, and On-Demand Content Delivery in a Web 2.0 World
sponsored by BlueCoat
ANALYST REPORT: In this report you will learn: How the Internet has evolved as we have moved from Web 1.0 to Web 2.0, Dynamics of new Web affects on service providers, Challenges faced by access providers in developing markets, Mobile operator specific challenges and Emerging Web 2.0 Internet usage pattern impact.
Posted: 01 Mar 2011 | Published: 28 Feb 2011

BlueCoat

How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility
sponsored by SonicWALL
EBOOK: This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.
Posted: 25 Feb 2011 | Published: 25 Feb 2011

SonicWALL

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

3-Step-Migration: Microsoft Office 2003 to Oracle Open Office
sponsored by Oracle Corporation
WHITE PAPER: This brief paper is designed to assist IT professionals and system integrators who want to move an organization from Microsoft Office 97/2000/XP/2003 to Oracle Open Office. Continue reading to learn more.
Posted: 14 Feb 2011 | Published: 03 Jan 2011

Oracle Corporation

Editorial Tip: Measuring the ROI of Social CRM: No easy task
sponsored by Infor
EGUIDE: As more organizations invest in social channels, the question of value becomes increasingly important. In social media, ROI alone may not tell the value of the effort, and benefits to the business from the customer service approach could be gauged by a variety of factors. Uncover how to measure the real value of an investment in social CRM.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Infor
201 - 225 of 303 Matches Previous Page    7 8 9 10 11 12    Next Page
 
WEB 2.0 DEFINITION (continued): …  paperTim O'Reilly is generally credited with inventing the term, following a conference dealing with next-generation Web concepts and issues held by O'Reilly Media and MediaLive International in 2004. O'Reilly Media has subsequently been energetic about trying to copyright "Web 2.0" and holds an annual conference of the same name. There is, however, some dispute about whether O'Reilly is responsible for the original coinage. Joe Firmage, for instance, used Web 2.0 to describe using the World Wide Web as a platform in 2003.One of the most significant differences between Web 2.0 and the traditional … 
Web 2.0 definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement