Emerging Technologies  >  

Web 2.0

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Web 2.0 (or Web 2) is the popular term for advanced Internet technology and applications including blogs, wikis, RSS and social bookmarking. The two major components of Web 2.0 are the technological advances enabled by Ajax and other new applications such as RSS and Eclipse and the user empowerment that they support. Web 2.0 in the Enterprise: An Analyst's Perspective -- Click here to read the white  … 
Definition continues below.
Web 2.0Reports
226 - 250 of 319 Matches Previous Page  | Next Page
Technical guide on Web Security Gateways
sponsored by SearchSecurity.com
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

SearchSecurity.com

Essential Guide to Threat Management
sponsored by SearchSecurity.com
EGUIDE: Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Posted: 15 Mar 2011 | Published: 15 Mar 2011

SearchSecurity.com

Nine Keys to Innovation Management 2.0
sponsored by Spigit
WHITE PAPER: Innovation is a hot topic right now, but it's never actually gone out of style. This paper highlights the nine keys to seizing the opportunity of Innovation Management 2.0.
Posted: 31 May 2011 | Published: 31 May 2011

Spigit

E-Guide: Next Steps and Trends in Enterprise Content Management
sponsored by Dell, Inc.
EBOOK: Enterprise content management is a long-established market, but ECM technology is changing, evolving and taking on increased importance to organizations. This eBook provides an overview of ECM, a recap of recent developments in the market and an in-depth look at emerging management trends.
Posted: 27 May 2011 | Published: 27 May 2011

Dell, Inc.

Unified Content Security in Practice
sponsored by Websense, Inc.
WHITE PAPER: Unified Content Security is a new sescurity solution, but it is an effective one. With this solutions your business is able to combine web security, email security, and data loss prevention.
Posted: 03 May 2011 | Published: 03 May 2011

Websense, Inc.

Top 5 Reasons to move Lotus Notes apps to the cloud with Force.com
sponsored by Salesforce.com
WHITE PAPER: Many Lotus Notes customers realize it's not a matter of “if” but “when” their applications will be migrated to a modern Web infrastructure. This paper has five key reasons that more and more customers are choosing to move their Notes apps to the cloud with Force.com, including ease of use and integration.
Posted: 29 Apr 2011 | Published: 29 Apr 2011

Salesforce.com

Agile Development with IBM Rational Synergy and IBM Rational Team Concert
sponsored by IBM
WEBCAST: See how to take advantage of these RTC and Jazz features with Synergy and Change source control and change management.
Posted: 04 Apr 2011 | Premiered: Apr 4, 2011

IBM

Close Encounters of the Third Kind
sponsored by IBM
WHITE PAPER: This paper presents results of research performed by IBM into client-side JavaScript vulnerabilities using a JavaScript Security Analyzer (JSA), which performs static taint analysis on JavaScript code that was collected from web pages extracted by an automated deep web crawl process.
Posted: 22 Mar 2011 | Published: 21 Mar 2011

IBM

Leveraging the Power of Social Media
sponsored by Oracle Corporation
WHITE PAPER: Download this free white paper and find out how to "Drive Sales Effectiveness with Enterprise-Ready Web 2.0Solutions," "Harvest Social Knowledge for Customer Service," and learn how "Social CRM Turns Customers into Competitive Advantage."
Posted: 21 Mar 2011 | Published: 03 Aug 2009

Oracle Corporation

Next-generation capabilities of enterprise application-aware firewalls
sponsored by SonicWALL
EGUIDE: The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

The Return of Web Caching: Bandwidth Savings, Network Resilience, and On-Demand Content Delivery in a Web 2.0 World
sponsored by BlueCoat
ANALYST REPORT: In this report you will learn: How the Internet has evolved as we have moved from Web 1.0 to Web 2.0, Dynamics of new Web affects on service providers, Challenges faced by access providers in developing markets, Mobile operator specific challenges and Emerging Web 2.0 Internet usage pattern impact.
Posted: 01 Mar 2011 | Published: 28 Feb 2011

BlueCoat

How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility
sponsored by SonicWALL
EBOOK: This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.
Posted: 25 Feb 2011 | Published: 25 Feb 2011

SonicWALL

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Security from Above: How Cloud based Security Delivers Up‐to‐the‐Minute Network Protection
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: The convergence of numerous trends is causing organizations to reconsider their approach to security.While widespread email viruses and worms have decreased, attacks via the web are on the rise.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

WatchGuard Technologies, Inc.

3-Step-Migration: Microsoft Office 2003 to Oracle Open Office
sponsored by Oracle Corporation
WHITE PAPER: This brief paper is designed to assist IT professionals and system integrators who want to move an organization from Microsoft Office 97/2000/XP/2003 to Oracle Open Office. Continue reading to learn more.
Posted: 14 Feb 2011 | Published: 03 Jan 2011

Oracle Corporation

Editorial Tip: Measuring the ROI of Social CRM: No easy task
sponsored by Infor
EGUIDE: As more organizations invest in social channels, the question of value becomes increasingly important. In social media, ROI alone may not tell the value of the effort, and benefits to the business from the customer service approach could be gauged by a variety of factors. Uncover how to measure the real value of an investment in social CRM.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Infor

Mind the Gap: CISOs Work to Narrow the Breach-to-Detection Gap for Better Security
sponsored by Tripwire, Inc.
WHITE PAPER: Compliance is indeed a conscientious effort toward securing corpo­rate assets. IT organizations have committed much time and money to the cause. Despite security breaches still happening many still fly under the radar. This paper outlines what precautions need to be taken to avoid future security breaches.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Tripwire, Inc.

CIO Challenges: The Best Defense is a Good Offense
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper to learn how CIOs are building a foundation for a much more agile business that holds the potential for working in a more flexible way and enabling faster innovation by actively evaluating and experimenting with newer technologies.
Posted: 22 Jan 2011 | Published: 22 Jan 2011

Oracle Corporation

How to Get the Cisco Tech Support You Need, Online
sponsored by Cisco Systems, Inc.
WHITE PAPER: IT and telecom staff in small businesses (up to 250 employees) meet up at what Google Analytics reports is one of the most popular support sites of its size—the Cisco Small Business Support Community. Whenever you need technical support, or want to learn more about your technology, connect with the community and get support. Read on to learn more.
Posted: 20 Jan 2011 | Published: 20 Jan 2011

Cisco Systems, Inc.

HP TruClient technology: Accelerating the path to testing modern applications
sponsored by Hewlett-Packard Company
WHITE PAPER: This paper explores testing Web 2.0 applications and looks into reasons why traditional testing solutions aren’t a good fit for testing applications built with Ajax and other Web 2.0 technologies. It introduces the HP TruClient technology, and discusses how this revolutionary technology helps advance, accelerate, and simplify performance testing.
Posted: 17 Dec 2010 | Published: 16 Dec 2010

Hewlett-Packard Company

DataSheet: Rational Quality Manager
sponsored by IBM
DATA SHEET: IBM Rational Quality Manager offers two views on the individual user’s dashboard: A work-item list that shows a tester what work has been assigned to him or her, and a team event log that updates automatically as activities occur/progress. Together these views help ensure that everyone is on the same page.
Posted: 14 Dec 2010 | Published: 14 Dec 2010

IBM

Business Process Management Solution Implementation Guide
sponsored by IBM
WHITE PAPER: The BPM Solution Implementation Guide, an IBM® Redpaper™, provides a practical approach to rapid Business Process Management solution delivery. It describes how to analyze, model, and manage processes in the context of a real healthcare scenario.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

IBM

Bailing Out Your Budget: How Websense Lowers Your TCO
sponsored by Websense, Inc.
WHITE PAPER: The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Websense, Inc.

Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or Train Wreck? (Spanish version)
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper for a discussion of the benefits and risks associated with the solution provided by the convergence of business process management, service-oriented architecture, and Web 2.0.
Posted: 27 Oct 2010 | Published: 28 Aug 2008

Oracle Corporation

Business Process Management, Service-Oriented Architecture, and Web 2.0: Business Transformation or Train Wreck?
sponsored by Oracle Corporation
WHITE PAPER: Read this white paper for a discussion of the benefits and risks associated with the solution provided by the convergence of business process management, service-oriented architecture, and Web 2.0.
Posted: 27 Oct 2010 | Published: 28 Aug 2008

Oracle Corporation
226 - 250 of 319 Matches Previous Page    8 9 10 11 12 13    Next Page
 
WEB 2.0 DEFINITION (continued): …  paperTim O'Reilly is generally credited with inventing the term, following a conference dealing with next-generation Web concepts and issues held by O'Reilly Media and MediaLive International in 2004. O'Reilly Media has subsequently been energetic about trying to copyright "Web 2.0" and holds an annual conference of the same name. There is, however, some dispute about whether O'Reilly is responsible for the original coinage. Joe Firmage, for instance, used Web 2.0 to describe using the World Wide Web as a platform in 2003.One of the most significant differences between Web 2.0 and the traditional … 
Web 2.0 definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement