Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Web Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Smart Services, Dynamic Services, Web Services (Software)
DEFINITION: Project Metro (formerly Project Tango) is an open source initiative for the implementation of Web services technologies involving optimization, reliability, security and atomic transactions. It is a joint venture by Sun Microsystems and Microsoft, intended to provide interoperability between Sun's Java Web services and Microsoft's Windows Communication Foundation (WCF). An important component of Project  … 
Definition continues below.
Web Services Reports
51 - 75 of 228 Matches Previous Page  |  Next Page
Open Source Integration Software in the Enterprise
sponsored by Red Hat
WHITE PAPER: Check out this informative resource for key deployment criteria of open source software and learn how you can leverage open source software for a variety of integration projects, including data center integration, SOA initiatives, and middleware strategies.
Posted: 10 Jun 2013 | Published: 31 Mar 2013

Red Hat

Reasons to Modernize Your Middleware
sponsored by Red Hat
WHITE PAPER: Aging and inflexible middleware can be hindering your organization in more ways than one, especially when it comes to change management. In this white paper, learn the key characteristics of a modern middleware platform and discover how you can benefit by migrating from a legacy middleware infrastructure to a more flexible, modular environment.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Red Hat

How to be influential online
sponsored by
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

Web-facing applications: Security assessment tools and strategies
sponsored by
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

Exploring new web browser security capabilities
sponsored by
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

Cyber Vulnerability Index 2012
sponsored by
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

Gartner: HTML5 and the journey to the modern web
sponsored by
ANALYST BRIEF: Gartner analysts explain what steps IT departments need to take to take advantage of HTML5 and why they need to act sooner rather than later.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

CW500: The technology behind the BBC's Olympics coverage (video version)
sponsored by
PRESENTATION: John Linwood Chief Technology Office at the BBC explains the "terrifying" challenge of providing live coverage of all events at the Olympics, in this presentation for Computer Weekly's 500 Club.
Posted: 31 Jul 2012 | Published: 25 Jul 2012

Fujitsu Software Interstage Business Operations Platform
sponsored by Fujitsu
VIDEO: In today's marketplace, businesses need to enhance collaboration between business and IT - otherwise, misalignment can cause bottlenecks, inefficiency, poor use of resources. Watch this video to learn about a platform-as-a-service (PaaS) offering that improves IT-business collaboration for developing process-centric applications and services.
Posted: 19 Jul 2013 | Premiered: 23 Oct 2012


Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013


SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers
sponsored by Red Hat and HP
WHITE PAPER: Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat and HP

Information Security Magazine - March 2013
sponsored by
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

SOA Best Practices in the Mobile Age
sponsored by IBM
EBOOK: Although SOA is seen as the foundation of a mobile development initiative, developing and deploying mobile apps requires more than just SOA. Read this expert book to learn how mobile broadband will affect app development, how SOA has changed as a result of mobile apps, and two unique approaches to mobile app development.
Posted: 24 Jan 2013 | Published: 24 Jan 2013


Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012


Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge
sponsored by IBM
EGUIDE: This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting.
Posted: 18 Dec 2012 | Published: 17 Dec 2012


sponsored by Verisign, Inc.
WHITE PAPER: View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Verisign, Inc.

GFI Reviews and awards
sponsored by GFI LanGuard
WHITE PAPER: Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Leveraging the Cloud to Improve Endpoint Protection – Sept 6th at 10:00am (PDT) live date
sponsored by Webroot
WEBCAST: Find the answers to all of your challenging endpoint protection and web security questions by viewing this informative Webcast. Go beyond the concepts on performance effectiveness and learn the critical aspects of threat protection.
Posted: 30 Aug 2012 | Premiered: Sep 6, 2012


Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this cheat sheet to discover a revolutionary approach to cloud security. Find out more about some of the key advantages and fast facts regarding, deployment and performance, threat detection and remediation and more.
Posted: 28 Aug 2012 | Published: 28 Aug 2012


How to Automate HTML5 Testing
sponsored by SmartBear Software
WEBCAST: This webcast is designed to address development teams' testing questions when it comes to HTML5. Then learn how to effectively automate your HTML5 testing to ensure a more efficient and timely process.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012


Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall
sponsored by PortalGuard
WHITE PAPER: Consult this informative white paper to find out how you can resolve issues with user-accessibility. Single sign-on can eliminate problems with multiple password prompts and make accessibility easier for the user. Learn why a single sign-on process can help handle an organizations multiple cloud applications as well as provide secure accessibility.
Posted: 13 Aug 2012 | Published: 13 Aug 2012


Webroot Cheat Sheet
sponsored by Webroot
WHITE PAPER: Consult this helpful guide to find out the vendors who offer the best endpoint protection. Consider factors such as deployment, performance, threat detection and more with this resource.
Posted: 13 Aug 2012 | Published: 28 Feb 2012


TCO Study for SAP on Amazon Web Services (AWS)
sponsored by Amazon Web Services
CASE STUDY: This study compares the TCO of SAP environments deployed on premise against those deployed on an Amazon Web Service (AWS). Read more inside to learn how Amazon Web Services saved SAP users up to 69% in infrastructure and operational costs and allows customer the flexibility to place SAP instances and store data within multiple regions worldwide.
Posted: 31 Jul 2012 | Published: 31 Jul 2012

Amazon Web Services

The Top 10 Reports for Managing Vulnerabilities
sponsored by Qualys
WHITE PAPER: Observing the complete lifecycle of vulnerability management begins with asset discovery. Learn more about the key steps for successful management with this informative resource. How can you improve your security?
Posted: 30 Jul 2012 | Published: 30 Jul 2012

51 - 75 of 228 Matches Previous Page    1 2 3 4 5 6    Next Page
WEB SERVICES DEFINITION (continued): …  Metro is known as Web Services Interoperability Technology (WSIT), which facilitates the development and maintenance of composite applications for service oriented architecture (SOA). Sometimes the terms "Project Metro" and "WSIT" are used interchangeably.In the context of Project Metro, reliability ensures that a communications system is able to recover from failures caused by lost or misdirected messages. This is done by a function called WS-ReliableMessaging that can be activated by means of a checkbox in a GUI (graphical user interface) called NetBeans. A specification … 
Web Services definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement