Web Services (Software) Reports

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

TechTarget Security

How to Automate HTML5 Testing
sponsored by SmartBear Software
WEBCAST: This webcast is designed to address development teams' testing questions when it comes to HTML5. Then learn how to effectively automate your HTML5 testing to ensure a more efficient and timely process.
Posted: 27 Aug 2012 | Premiered: Aug 27, 2012

SmartBear Software

Enable Mobile in the API Economy
sponsored by IBM
VIDEO: To achieve success with APIs, you need to manage both their creation and consumption -- but how? Find out in this brief video, where you'll discover a combination of tools that help you through the entire process: from API creation to mobile app development, and synchronization with back-end systems.
Posted: 13 Mar 2014 | Premiered: 13 Mar 2014

IBM

The New Information Agenda: Do You Have One?
sponsored by IBM
WHITE PAPER: This white paper defines the information agenda; describes key considerations and best practices in creating and implementing an information agenda.
Posted: 14 May 2008 | Published: 01 Jan 2008

IBM

API and Cloud Application Integration Strategies Today
sponsored by TechTarget App Architecture
EBOOK: Application programming interfaces (APIs) are increasing in popularity as mobile and cloud computing continue to gain traction, but managing APIs in your organization can seem like a daunting task. Fortunately, this expert 3-part handbook serves as a guide to APIs and cloud integration.
Posted: 20 May 2014 | Published: 20 May 2014

TechTarget App Architecture

E-Book: SOA: Technical Opportunities, Social Challenges
sponsored by Progress
EBOOK: In this paper you will learn how SOA can directly influence the success of your business, which will result from your business’ ability to participate in these new, more dynamic, federated communities. Read on to learn how social orientation is driving both new SOA technology needs and management changes in how technology is delivered and governed.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

Progress

API Design: How to Properly Build an Application Program Interface
sponsored by IBM
EGUIDE: What should you keep in mind while creating APIs? Find out in this expert Solution Spotlight, where you'll receive guidelines for building an API the right way to achieve functional integration and developer loyalty.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

IBM

Overcoming Barriers to Collaboration with Trading Partners
sponsored by Sage North America
WHITE PAPER: To meet the increasing demands of today's market, companies must implement collaborative supply chain solutions that streamline business processes with their trading partners. Read this white paper for expert advice for achieving that objective.
Posted: 13 Jan 2009 | Published: 13 Jan 2009

Sage North America

Business Fitness Gets in Shape with GoToMeeting Corporate with GoToWebinar
sponsored by Citrix Online
CASE STUDY: This new case study explores how Citrix® GoToMeeting® Corporate with GoToWebinar® has transformed Business Fitness's sales and marketing efforts, enabling the company to significantly reduce costs, speed up the sales cycle and vastly improve nurturing efforts.
Posted: 21 Aug 2009 | Published: 23 Mar 2009

Citrix Online

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com