Software  >   Applications Software  >   Internet Applications Software  >   Web Applications Software  >  

Web Services

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Smart Services, Dynamic Services, Web Services (Software)
DEFINITION: Java API for XML Web Services (JAX-WS) is one of a set of Java technologies used to develop Web services. JAX-WS belongs to what Sun Microsystems calls the "core Web services" group. Like most of the core group, JAX-WS is typically used in conjunction with other technologies. Those other technologies may also come from the core Web services group (JAXB, for example), as well as from enhanced  … 
Definition continues below.
Web ServicesReports
51 - 75 of 238 Matches Previous Page  | Next Page
Red Hat Enterprise Linux vs. Microsoft Windows Server 2008. Who wins?
sponsored by Red Hat
WHITE PAPER: How does Red Hat Enterprise Linux stack up to the competition? This whitepaper offers an overview of Red Hat Enterprise Linux as compared to Microsoft Window Server 2008 in terms of scalability, operational costs, and more.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

Red Hat

How to Succeed at Service-Oriented Architecture
sponsored by Global Knowledge
WHITE PAPER: In this helpful resource, discover everything you need to know about succeeding with a service-oriented-architecture (SOA) project. You'll get advice on how to design your service interfaces, your services, your data model, and your business processes, along with other tips and guidelines.
Posted: 26 Jul 2013 | Published: 27 Jun 2013

Global Knowledge

Open Source Integration Software in the Enterprise
sponsored by Red Hat
WHITE PAPER: Check out this informative resource for key deployment criteria of open source software and learn how you can leverage open source software for a variety of integration projects, including data center integration, SOA initiatives, and middleware strategies.
Posted: 10 Jun 2013 | Published: 31 Mar 2013

Red Hat

Reasons to Modernize Your Middleware
sponsored by Red Hat
WHITE PAPER: Aging and inflexible middleware can be hindering your organization in more ways than one, especially when it comes to change management. In this white paper, learn the key characteristics of a modern middleware platform and discover how you can benefit by migrating from a legacy middleware infrastructure to a more flexible, modular environment.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

Red Hat

SOA Best Practices in the Mobile Age
sponsored by SearchBusinessAnalytics
EBOOK: Although SOA is seen as the foundation of a mobile development initiative, developing and deploying mobile apps requires more than just SOA. Read this expert book to learn how mobile broadband will affect app development, how SOA has changed as a result of mobile apps, and two unique approaches to mobile app development.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

SearchBusinessAnalytics

How to be influential online
sponsored by ComputerWeekly.com
BOOK: Web psychologist, Nathalie Nahai explains how to use the web and social media to communicate your message more effectively.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

Web-facing applications: Security assessment tools and strategies
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert E-guide to find out how you can properly asses web application threats and the tools your organization can use for protection. Learn how to mitigate likely web application threats and how you can ensure your business is protected.
Posted: 08 Oct 2012 | Published: 08 Oct 2012

SearchSecurity.com

Exploring new web browser security capabilities
sponsored by SearchSecurity.com
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

SearchSecurity.com

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

End user response shouldn't be optional
sponsored by CA Nimsoft
WHITE PAPER: What is it that organizations are missing when trying to pinpoint network issues? Find out more in this resourceful white paper that unveils the importance of end user response monitoring.
Posted: 30 Sep 2013 | Published: 30 Sep 2012

CA Nimsoft

How The Burgiss Group Manages Business Risk with AppFirst
sponsored by AppFirst
CASE STUDY: This case study reveals which solution the Burgiss Group trusts to help them monitor the behavior of their applications and systems and – in turn – ensure an optimal experience for their clients. View now to learn more!
Posted: 04 Sep 2013 | Published: 04 Sep 2013

AppFirst

TotalJobs Group – Sitecore fills Web CMS vacancy at Totaljobs Group
sponsored by Sitecore
CASE STUDY: To empower non-technical business stakeholders and reduce the reliance on specialist developers, Totaljobs Group needed to select the right web content management system. View this case study to learn how they reduced development costs substantially by shifting the responsibility for managing website content.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Sitecore

Manchester City – Building a media-rich website with Sitecore
sponsored by Sitecore
CASE STUDY: Manchester City needed their football club's website to be content and media rich, up to date, informative for fans and convenient for payment transactions. A new website platform was integrated, and the result was an overwhelming success. Learn more in this case study.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Sitecore

CICS and SOA Architecture and Integration Choices
sponsored by IBM
EBOOK: In this comprehensive e-book, explore the ways in which IBM's CICS server offers support for SOA strategies and seamlessly connects with other IT environments. With this information, you can select, plan, and design strategies that integrate CICS applications as service providers and requesters.
Posted: 30 Jul 2013 | Published: 31 Mar 2012

IBM

Fujitsu Software Interstage Business Operations Platform: A foundation for Smart Process Applications
sponsored by Fujitsu
WEBCAST: To enable business innovation and collaboration, you need a way to enhance your existing ERP systems. In this webcast, learn how Smart Process apps give you ERP agility, what you need to create them, and how a business operations platform can serve as a foundation for these Smart Process apps.
Posted: 22 Jul 2013 | Premiered: Apr 10, 2013

Fujitsu

The Great Firewall of China? How to address the specific challenges of reaching China with your website
sponsored by CDNetworks
WHITE PAPER: This valuable guide explores the challenges of reaching China with your website and offers tips to help you successfully build a customer base in this emerging market. Also inside, find the answers to frequently asked questions regarding licensing.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

CDNetworks

Fujitsu Interstage Business Operations Platform
sponsored by Fujitsu
WHITE PAPER: Access this resource to learn about a Platform-as-a-Service (PaaS) offering that massively reduces the cost and disruption of change in your IT environment. Read on to learn how this technology provides the link between business operations and IT, so that systems are completely under control and you experience minimal risk.
Posted: 19 Jul 2013 | Published: 31 Dec 2012

Fujitsu

Fujitsu Software Interstage Business Operations Platform
sponsored by Fujitsu
VIDEO: In today's marketplace, businesses need to enhance collaboration between business and IT - otherwise, misalignment can cause bottlenecks, inefficiency, poor use of resources. Watch this video to learn about a platform-as-a-service (PaaS) offering that improves IT-business collaboration for developing process-centric applications and services.
Posted: 19 Jul 2013 | Premiered: 23 Oct 2012

Fujitsu

Bring Your Own Security to the Cloud
sponsored by CenterBeam
VIDEO: Watch this video to learn how the bring-your-own-security (BYOS) model allows you to have authorization and authentication for cloud-hosted services against your own active directory, not the hosts.
Posted: 12 Jun 2013 | Premiered: 12 Jun 2013

CenterBeam

SRI Ecuador Implements Red Hat Solutions: A Scalable , Reliable Platform to Provide Online Services to Taxpayers
sponsored by Red Hat and HP
WHITE PAPER: Access this informative case study to learn how Ecuador's tax management agency utilized a Linux solution to enable and promote internet-based tax return filing, reducing processing times and avoiding increased infrastructure complexity.
Posted: 10 Apr 2013 | Published: 10 Apr 2013

Red Hat and HP

Information Security Magazine - March 2013
sponsored by SearchSecurity.com
EZINE: This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Posted: 28 Feb 2013 | Published: 01 Mar 2013

SearchSecurity.com

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

Gartner Sees Cloud Computing, Mobile Development Putting IT on Edge
sponsored by IBM
EGUIDE: This fall, Gartner Inc.'s 2012 ITxpo conference centered around the highly disruptive, consumer-driven group of phenomena that consists of cloud computing, Web information, mobile devices, and social media innovations. Read this expert e-guide to find out what conclusions Gartner reached about how IT should be adjusting.
Posted: 18 Dec 2012 | Published: 17 Dec 2012

IBM

STATE OF DNS AVAILABILITY REPORT
sponsored by Verisign, Inc.
WHITE PAPER: View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Verisign, Inc.

GFI Reviews and awards
sponsored by GFI LanGuard
WHITE PAPER: Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard
51 - 75 of 238 Matches Previous Page    1 2 3 4 5 6    Next Page
 
WEB SERVICES DEFINITION (continued): …  Web services (WSIT), secure Web services (WSIT, WS-Security), legacy Web services (JAX-RPC), and systems management services (WS-Management) groups.JAX-WS is a fundamental technology for developing SOAP (Simple Object Access Protocol) and RESTful (Web services that use representational state transfer, or REST, tools) Java Web services, where JAX-WS is designed to take the place of the JAVA-RPC (Remote Procedure Call) interface in Web services and Web-based applications. JAX-WS is also used to build Web services and corresponding clients that communicate using XML to send messages or use remote … 
Web Services definition sponsored by SearchSOA.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement