EZINE:
In this week's Computer Weekly, we examine what retailers need to do to make their digital channels accessible for disa-bled people. We look at the rise of alternative desktop productivity tools to Microsoft Office. And our new buyer's guide covers next-generation programming tools such as no-code/low-code development. Read the issue now.
EZINE:
This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
WEBCAST:
This webcast is designed to address development teams' testing questions when it comes to HTML5. Then learn how to effectively automate your HTML5 testing to ensure a more efficient and timely process.
EBOOK:
In this paper you will learn how SOA can directly influence the success of your business, which will result from your business’ ability to participate in these new, more dynamic, federated communities. Read on to learn how social orientation is driving both new SOA technology needs and management changes in how technology is delivered and governed.
EGUIDE:
Consult this expert e-guide for advice from Gartner Vice President Anne Thomas Manes and other IT professionals on architecture planning, design best practices, and new approaches to building services with service-oriented architecture (SOA).
EBOOK:
Although SOA is seen as the foundation of a mobile development initiative, developing and deploying mobile apps requires more than just SOA. Read this expert book to learn how mobile broadband will affect app development, how SOA has changed as a result of mobile apps, and two unique approaches to mobile app development.
EBOOK:
In this comprehensive e-book, explore the ways in which IBM's CICS server offers support for SOA strategies and seamlessly connects with other IT environments. With this information, you can select, plan, and design strategies that integrate CICS applications as service providers and requesters.
EBOOK:
Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of virtualization security.
WHITE PAPER:
This white paper details a holistic approach for Service Orientated Architecture (SOA) security using additional, application-level industry standards to secure web services and multi-step transactions in a SOA environment.