Dynamic Services Reports

Modernize Your Legacy Apps for Cloud, Mobile, and More
sponsored by Red Hat
EGUIDE: In this e-guide, Gartner analyst Dale Vecchio reveals 3 primary approaches to legacy app modernization. Plus, learn approaches for incorporating mobile apps as part of your legacy system modernization effort.
Posted: 22 Jun 2016 | Published: 20 Jun 2016

Red Hat

API Design: How to Properly Build an Application Program Interface
sponsored by IBM
EGUIDE: What should you keep in mind while creating APIs? Find out in this expert Solution Spotlight, where you'll receive guidelines for building an API the right way to achieve functional integration and developer loyalty.
Posted: 04 Apr 2014 | Published: 04 Apr 2014

IBM

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Running High Availability Drupal Websites with Acquia and AWS
sponsored by Acquia, Inc.
PRESENTATION TRANSCRIPT: While most companies have launched a website, many lack an implementation that will keep their site up and running during even the most critical times. Access this presentation transcript to discover how the right managed cloud service provider, infrastructure, resources, and on-demand support will maximize the effectiveness of your website.
Posted: 28 Jun 2012 | Published: 28 Jun 2012

Acquia, Inc.

What to Do When You Have an IP Address but No Internet Connection
sponsored by Global Knowledge
WHITE PAPER: When we have an IP address but can't connect to the Internet, we need basic troubleshooting skills to verify both connections and configuration. Download this resource to learn about the local network, parts of IP addressing, and DHCP basics for resolving these types of connectivity issues.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Global Knowledge

SOA Governance and Test Update
sponsored by IBM
EGUIDE: In this E-Guide, readers will hear from experts in the space (including well-known David Linthicum) around SOA governance and its relationship with lightweight, flexible enterprise architecture.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

IBM

Building Solutions For Smarter Governments: Six Ways to Increase Responsiveness, Service Quality, Accountability and Taxpayer Value
sponsored by IBM
WHITE PAPER: This paper describes how smarter government means making operations and services truly citizen-centric, integrating their service delivery, coordinating programs and allowing a choice of access channels, as well as placing the most needed transactions on the Web.
Posted: 21 Jan 2011 | Published: 21 Jan 2011

IBM

Cloud Web Security Using Cisco ASA
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource examines a cloud web security (CWS) solution that offers a combination of web usage controls with category and reputation-based control, malware filtering, and data protection to address the need for a corporate web security policy.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Cisco Systems, Inc.

Mobile Middleware 101
sponsored by Appcelerator
WEBCAST: In order to meet the new requirements of middleware for mobile development, many companies are turning to mobile Backend-as-a-Service (mBaaS). Watch this informative webcast to explore the requirements, capabilities, and benefits of mBaaS now.
Posted: 28 Oct 2013 | Premiered: Oct 28, 2013

Appcelerator

E-Guide: How to build a toolset to avoid Web 2.0 security issues
sponsored by TechTarget Security
EGUIDE: Collaborative, interactive nature of Web 2.0 technology has great appeal for business, and companies of all sizes and verticals are taking full advantage of social networking sites, free online services and other platforms. Learn how to implement security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network.
Posted: 17 Sep 2010 | Published: 17 Sep 2010

TechTarget Security