Web Services (Software) White Papers

(View All Report Types)
STATE OF DNS AVAILABILITY REPORT
sponsored by Verisign, Inc.
WHITE PAPER: View this informative white paper to learn more about the domain name system vulnerabilities that you should keep in mind for the busy season. Find out some of the challenges of availability and the impact downtime can have on your enterprise by accessing this resource.
Posted: 26 Sep 2012 | Published: 26 Sep 2012

Verisign, Inc.

Simplify Security for REST and WS* Web Services: The Gateway Approach
sponsored by Intel
WHITE PAPER: This solution brief presents how to simplify the implementation of standardized enterprise security for both REST and WS-* services, and how a Service Gateway can act as a central Policy Enforcement Point to delegate authentication/authorization and provide REST to SOAP mediations without having to write code.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Intel

One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. Read this paper to learn more.
Posted: 15 Jun 2010 | Published: 15 Jun 2010

IntraLinks, Inc

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Introduction to MTOM: A Hands-on Approach
sponsored by Crosscheck Networks
WHITE PAPER: This white paper explores how to enhance the electronic transmission of critical data across an SOA using a SOAP Message Transmission Optimization Mechanism.
Posted: 03 Jan 2008 | Published: 21 Dec 2007

Crosscheck Networks

A Guide to SOA Implementation
sponsored by Torry Harris Business Solutions
WHITE PAPER: There is an information overload on SOA's merits, principles and products. This document will help to separate the hype from reality, distill the essential from the desirable, and explicitly address the how-to, nuts and bolts of an SOA implementation.
Posted: 02 Apr 2007 | Published: 01 Jan 2006

Torry Harris Business Solutions

What to Do When You Have an IP Address but No Internet Connection
sponsored by Global Knowledge
WHITE PAPER: When we have an IP address but can't connect to the Internet, we need basic troubleshooting skills to verify both connections and configuration. Download this resource to learn about the local network, parts of IP addressing, and DHCP basics for resolving these types of connectivity issues.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

Improving Performance and Control in SAP Environments [Cisco ACE XML Gateways]
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this paper to find out how to meet the new challenges posed by the proliferation of XML-based services. Discover an appliance that can be combined with SAP Business Suite and NetWeaver to improve performance, security, availability, and monitoring and auditing (for compliance) for applications and Web services in SAP environments.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Cisco Systems, Inc.

Delivering the Data Layer of the Cloud: The Business Case for APIs
sponsored by StrikeIron
WHITE PAPER: In this white paper, explore the business case for APIs and learn why it may be a good idea to publish APIs for your organization. Compare the options of building your API capabilities internally and leveraging an API platform provider to achieve end-to-end API management.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

StrikeIron

The Right Tool for the Right Job: An Application Security Tools Report Card
sponsored by IBM
WHITE PAPER: This white paper examines the most common tools found in the enterprise application security environment.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM