IT Management  >   Systems Design and Development  >   Architectures  >   Software Architectures  >   Web Applications Architectures  >  

Web Architectures

RSS Feed    Add to Google    Add to My Yahoo!
Web Architectures Reports
 
The 4 Secrets of a Successful API
sponsored by MuleSoft
WHITE PAPER: This informative white paper reveals 4 secrets of building a successful application programming interface (API), including design for great user experience, optimize for use case, and more.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

MuleSoft

SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

Securing Web Services and Service-Oriented Architectures with Oracle Web Services Manager 11g
sponsored by Oracle Corporation
WHITE PAPER: While web services offer extraordinary value to a company, they are not free of challenges – especially when it comes to security and management. Read this white paper to learn how the Oracle Web Services Management (WSM) is equipped with the capabilities to help you tackle web-services-based SOA security and management issues.
Posted: 29 Jun 2012 | Published: 29 Jun 2012

Oracle Corporation

Cloud Elements’ CEO talks enterprise cloud services
sponsored by IBM
EGUIDE: As more vendors enter the enterprise cloud services market, organizations are going to have a wider range of product options. In this Q&A Mark Geene, Cloud Elements' founder and CEO, discussed what his company is doing to stay ahead of competitors in the enterprise cloud services market and offers toolset selection advice.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

IBM

Improving Performance and Control in SAP Environments [Cisco ACE XML Gateways]
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this paper to find out how to meet the new challenges posed by the proliferation of XML-based services. Discover an appliance that can be combined with SAP Business Suite and NetWeaver to improve performance, security, availability, and monitoring and auditing (for compliance) for applications and Web services in SAP environments.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Cisco Systems, Inc.

Can SOA Get More Flexible to Meet Complex Challenges?
sponsored by IBM
EGUIDE: In this E-Guide, readers will hear from experts in the SOA space (including well-known David Linthicum) around SOA governance and its relationship with lightweight, flexible enterprise architecture.
Posted: 21 Oct 2013 | Published: 21 Oct 2013

IBM

Enterprise Portal Rationalization: Using a Service-Oriented Architecture to Stop Web Asset Sprawl
sponsored by Oracle Corporation
WHITE PAPER: This paper provides an overview of the problem of Web sprawl, and an account of the rationalization strategies organizations are adopting to gain the upper hand on sprawl. Adopting a service-oriented architecture based on integrated application platform infrastructure emerges as the key to rationalizing sprawl.
Posted: 03 Apr 2009 | Published: 01 Mar 2009

Oracle Corporation

Best Practices to Assure High Performance: Optimizing Web Applications in a Web 2.0 World
sponsored by Gomez
WHITE PAPER: Faced with rising customer expectations and increasing competitive pressures, Website managers are applying new technologies. In this paper, Gomez will address why traditional “Web page” monitoring is insufficient, how new demands on client-side computing change the performance game, and what the return of the browser wars means for your business.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

Gomez

WebSphere eXtreme Scale V7: Solutions Architecture (redbook)
sponsored by IBM
EBOOK: This paper is a follow-up to Users Guide to WebSphere eXtreme Scale, updating the architectural content for WebSphere eXtreme Scale V7.
Posted: 12 Oct 2010 | Published: 14 Dec 2009

IBM

On-Demand Security Audit and Vulnerability Management - A Proactive Approach to Network Security
sponsored by Qualys, Inc.
WHITE PAPER: This paper explores the various approaches to network security and focuses on the unique role of vulnerability management and automated security audits. Learn about the four pillars of security and different approaches to vulnerability management.
Posted: 07 Nov 2006 | Published: 01 Sep 2006

Qualys, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement