We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.
48 white_paper items found, showing 1-30 Sort by Relevance / Date
01/25/2010 Smarter State Government Processes in 2010 - Enabling Citizen-Centric Processes, Transforming Service Delivery and Reducing Costs with IBM WebSphere ILOG Business Rule Management System (BRMS) Technology Gold Club Protected
Today states and government agencies must be able to respond and adapt quickly to relentless change to improve citizen and business services, manage resources effectively and efficiently, strengthen national security and public safety and ensure a sustainable environment. Find out how technology can enable the delivery of better value for citizens and lower costs in this solutions brief.
01/14/2010 Implementing a “Business Process Culture” to Automate Core Process Gold Club Protected
This white paper documents the power of BPM to automate and enhance core processes — in this case, classification of information coming into and going out of a government security agency. Because of the sensitive nature of the application, the identity of the agency has been concealed. Despite this anonymity, other organizations can learn how to take advantage of a business process management approach to developing and deploying applications by learning about this agency’s success in implementing a “business process culture” to solve a major security challenge.
01/12/2010 Understanding the Business Benefits of an Open Source SOA Platform Gold Club Protected
A Hurwitz White Paper
Open source has been proven particularly effective when implementing SOA. Using open source reduces the cost of tools while providing a range of options from different providers. Having access to the source code also eliminates concerns about vendor lock-in. Finally, open source offers a broad and supportive community and ecosystem to support the SOA initiative. At the same time, commercial open source SOA tools carry with them the full support of a well-established vendor.
11/23/2009 Protecting Your Network Against the Growing Danger of Web Attacks Gold Club Protected

Web sites containing malware are increasing exponentially. Combating the new threats posed by the Web can be a challenge for organizations. Learn about the negative impact these growing Web threats can have on your business and why proactively protecting your company through an enforced acceptable usage policy in combination with a hosted Web security and filtering service is important.

11/06/2009 Enterprise PBX Buyer's Guide Gold Club Protected

Premise-based IP PBX (Internet Protocol Private Branch eXchange) systems are changing how businesses implement and use their voice communications. IP PBX systems are cheaper and far more capable than their predecessors. They also integrate much better into business networks and data communications which, in turn, enable new applications that are still being discovered and applied to common business practices. Download this free Buyer's Guide and have access to comprehensive expert research on all aspects of the IP PBX market.

10/14/2009 Smarter State Government Processes in 2010 Gold Club Protected
- Enabling Citizen-Centric Processes, Transforming Service Delivery and Reducing Costs with IBM WebSphere® ILOG Business Rule Management System (BRMS) Technology
Today states and government agencies must be able to respond and adapt quickly to relentless change to improve citizen and business services, manage resources effectively and efficiently, strengthen national security and public safety and ensure a sustainable environment. Find out how technology can enable the delivery of better value for citizens and lower costs in this solutions brief.
02/17/2009 Data privacy best practices: time to take action! Gold Club Protected
In the midst of unprecedented security breaches, the best way to ensure that confidential information remains protected is to develop and implement a comprehensive privacy and security strategy. This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
02/11/2009 Maximize Business Value with Right-Time Information Using Data Services Gold Club Protected
How agile is your business? It's a question you can't afford to ignore, especially since being agile is how businesses effectively thrive in today's competitive environment. Unfortunately, too many organizations lack timely access to accurate, reliable, and relevant information, that drives business agility.

Therefore, organizations are forced to rethink how they access and integrate enterprise data across business unit silos and corporate firewalls. Application-centric integration approaches—SOA, BPM, EAI, and ESB—promise agility, but fail to deliver on that promise unless complemented by a sophisticated data integration platform that delivers holistic and accurate information as a service to consuming applications and business processes, exactly at the speed of the business.

Download this compelling Informatica White Paper to learn how your IT organization can leverage the power of a sophisticated data services solution to implement an agile enterprise information management (EIM) strategy. Discover how you can maximize business agility with right-time information to increase competitive advantage, improve compliance, and reduce cost, complexity, and risk.
12/15/2008 Magic Software's uniPaaS Provides Flexible Rich Internet Application and SaaS Platform for ISVs and Enterprises Gold Club Protected
Jeff Kaplan of THINKstrategies talks about uniPaaS, and the advantages of metadata-driven approach for RIA and SaaS development .

Jeff Kaplan recommends that ISVs and enterprise software developers consider SaaS platforms which permit the greatest flexibility in addition to their scalability and security considerations. 
Kaplan believes we are quickly approaching an era in which customers will demand a choice of acquiring SaaS solutions delivered in the ‘cloud’ or deploying the solution behind the firewall on-premise. In response, ISVs and enterprise software developers are recommended to start thinking about SaaS platforms which permit the greatest flexibility in addition to their scalability and security considerations.

In this context, Kaplan examines the merits of Magic Software’s uniPaaS application platform in offering a single development paradigm with multiple deployment modes. He thinks that uniPaaS represents an attractive platform for ISVs with existing single-tenant applications who want to migrate to a multi-tenant approach without ending up with two code bases and platforms to support. This can save ISVs significant monies and accelerate the time to market and ROI. 
Kaplan also thinks that Magic Software’s uniPaaS provides flexible Rich Internet Application and SaaS platform for ISVs and enterprises, by offering a metadata-driven alternative to typical code-centric software development solutions. uniPaaS provides ISVs and enterprises with the tools they need to cost-effectively develop RIA and SaaS solutions to cater to their varying requirements. It could help open up the SaaS market to more ISVs who otherwise would not attempt to carry on-premise and on-demand solutions, and could encourage additional market growth and innovation.
12/02/2008 Data Grids as an Imperative for SOA Implementations Gold Club Protected

A basic principle of SOA is the decoupling of applications and services. This leads to increased changes to existing applications and services, as well as more frequent creation of new ones. Because more services and applications are now creating, accessing, updating, and deleting (CRUD) operational data, the ability to establish concurrent control, transactional integrity, and response performance is more important and more challenging than ever. Significantly more data is generated with CRUD operations, and the amount is unpredictable. The ability to dynamically scale the enterprise data repository and to ensure reliable availability of data services - even when the database reaches full capacity or becomes unavailable - is critical.

One of the important benefits of an SOA is the opening of legacy applications and their data stores to much wider use. An associated challenge, however, is that the legacy asset may not be architected in a way that supports the transactional demands resulting from that wider use. By providing a buffer against the legacy data store, a data grid can serve as a caching layer that scales linearly to extreme levels. IT does not have to re-architect the legacy asset; the data grid enables IT to offer broader access with high service levels.

06/16/2008 Mitigate Risk with Security Assessments Gold Club Protected
Security requires a broad, organization-wide effort that extends to people, policies and actions. To mitigate risk and manage security, organizations must be able to measure the effectiveness of the people, policies, processes and products securing applications and data. Download this white paper to learn how.
05/14/2008 BI for Telecom Gold Club Protected
By: Don Tapscott THE ONCE SLOW, REGULATED, and predictable telecommunications industry is receiving a serious wakeup call. Recent increases in bandwidth, ubiquity of access, and multiplication of devices have enabled a plethora of new applications and opportunities, once unimagined, to develop. At a time when understanding the customer is key to competitive advantage, many incumbents are still struggling to distill actionable intelligence from their accumulated data. Those organizations that can capture, coalesce and synthesize this information into actionable intelligence will thrive, staying ahead of their competitors by discovering, enabling, launching, and tailoring the next generation of products and services.
02/20/2008 Compliance and Beyond: Toward a Consensus on Identity Management Best Practices Gold Club Protected

For more than a decade, government and industry bodies around the world have issued a growing number of regulations designed -- in whole or in part -- to ensure the security, integrity and confidentiality of personal and corporate data . Regulations are often mandatory and compliance must be verifiable.

Organizations have undertaken programs to ensure compliance with these regulations, a similar consensus has begun to emerge on how to achieve compliance. Forward-thinking companies are now exploring how to do this affordably while ensuring maximum user convenience and satisfaction. This white paper explores these compliance-driven best practices and how prioritizing their implementation makes good business sense beyond the fulfillment of compliance requirements.

12/21/2007 Avoiding Disastrous Insider Security Breaches Gold Club Protected
Eighty percent of publicized data breaches come from internal sources, and this suggests that organizations that have focused their IT security efforts only on protecting the perimeter are at high risk for potentially disastrous insider security breaches. This Imprivata white paper discusses effective best practices to help your organization counter the insider threat.
11/26/2007 IBM SOA Appliances: Redefining the Boundaries of Middleware Gold Club Protected
SOA appliances from IBM are game-changing solutions that are redefining the boundaries of middleware extending the SOA Foundation with specialized, consumable, dedicated SOA appliances that combine superior performance and hardened security for SOA implementations. This article describes how SOA Appliances offer an innovative, pragmatic approach to harness the power and potential of SOA while simultaneously enabling you to leverage the value of your existing application, security, and networking infrastructure investments.
11/26/2007 Patterns for REST Services with WebSphere DataPower SOA Appliances Gold Club Protected
Representational State Transfer (REST) is the predominant architectural style of such distributed hypermedia systems as the World Wide Web. This article describes service patterns using IBM WebSphere DataPower SOA Appliances for REST-style software systems. Leveraging SOA appliances, these patterns help architects build more flexible software systems, as well as improve the security and scalability of REST-style software services.
10/26/2007 The Case for Application Security - How Real is the Threat and What Are Your Options Gold Club Protected
This report compiles data and research from numerous sources and organizes them into a single, straight-to-the-point, data-driven overview of current threats, the true costs of a data breach and the most effective solutions for securing your applications.
10/24/2007 Web Services Security: What's Required To Secure A Service-Oriented Architecture Gold Club Protected
The service-oriented architecture (SOA) concept is now embraced by many companies worldwide. However, because of its nature (loosely-coupled connections) and its use of open access (HTTP), SOA adds a new set of requirements to the security landscape. Download this white paper to learn about more specific SOA security challenges and how to address them.
08/07/2007 Next-Generation SOA Infrastructure Gold Club Protected
As SOA becomes the mainstream for enterprise, application developers are faced with a bewildering array of technologies for developing the next generation of applications. This white paper discusses the most important industry standards that are becoming available for developers to build interoperable services and composite applications, including JAX-WS, BPEL, WS-ReliableMessaging, WS-Addressing, SOAP with Attachments, MTOM, WS-Policy, UDDI, WS-Security and Service Component Architecture.
07/10/2007 Web Applications Under Attack: Four Eye-Opening Findings Gold Club Protected
Although there are numerous reports covering viruses, network-based attacks, public vulnerability announcements, and Spam/Phishing schemes, there is little empirical data on the attacks that specifically target web applications. This report aims to shed light on how applications are being attacked.
07/05/2007 Introducing BEA AquaLogic Pages: Do-It-Yourself Web Application Building Gold Club Protected

Read this white paper to learn more about BEA AquaLogic Pages - a simple, powerful system that helps everyday participants create Web pages - wikis, blogs, data-driven collaborative Web applications, and more. BEA AquaLogic Pages combines proven capabilities from enterprise portals and traditional Web-content management technologies with the most promising and exciting concepts emerging on the Internet today: from the simple page-authoring and collaborative editing of Wikipedia(R) to the data-driven mashups of Yahoo!Pipes(TM).

BEA AquaLogic Pages serves the diverse needs of both IT departments and line-of-business users.

  • For IT, BEA AquaLogic Pages provides the management and governance control that core enterprise systems require. But its real impact is in IT's ability to empower a greater army of creators and participants, allowing business users to solve their challenges directly on the Web.
  • For everyday users, BEA AquaLogic Pages is a revolution: Creating for the Web becomes as simple as crating a Word document or sending an email. Users feed data from core enterprise systems directly into their applications, and can wire that data on the page to other components, like a Google Map or an RSS feed. Every page provides simple editing and the system tracks changes, versioning, and access.

06/01/2007 The Next Generation of BI Gold Club Protected
Business Intelligence 2.0 (BI 2.0) refers to the next generation of BI, just as Web 2.0 has come to refer to the next generation of the Web. The focus, like Web 2.0, is on people, empowering users to express their creativity, allowing them to freely access information and produce something meaningful from it while focusing on information sharing, communication, and collaboration. This White Paper explores the BI 2.0 concept and offers a perspective on real world solutions.
01/02/2007 Application Servers - 2006 User Rankings Gold Club Protected
In Summer of 2006, Evans Data Corporation interviewed over 700 technology professionals worldwide and asked them to rate the top features of the application servers they had actually used. In this FREE report, discover how these fiercely competing products fared on performance, cost, support, scalability, compatibility and integration, security features, server infrastructure, change management, and much, much more. Bar graphs for each parameter, along with quick-glance charts summarizing the top three performers in each category, make it easy to judge the results. This statistics-rich report just may become your best application server purchasing tool -- download it now.
11/09/2006 Fostering People's Interaction and Collaboration Gold Club Protected
To encourage efficiency and innovation, companies are looking for new ways to empower people using technology such as SOA. People are an integral part of the services delivered through SOA, because they interact with those services to execute business results. Businesses can provide personalized, streamlined environments for employees to interact with other people and targeted information using SOA and encourage greater collaboration among employees, business partners and customers. This executive brief explores in greater detail the people entry point for an SOA that enables real time views of key business processes and organization of information to help people interact effectively, make better decisions and collaborate more freely.
10/16/2006 The Current State of SOA Governance Gold Club Protected

As organizations adopt SOA, the topic of SOA Governance is receiving an increasing amount of attention. SOA Governance refers to the articulation and enforcement of policies related to service lifecycles, implementation protocols, service access, information protection and service level agreements.

To get the practitioner's point of view on SOA adoption and SOA Governance, ebizQ conducted an online survey during August 2006. This paper shares the results of the SOA Governance Survey, along with ebizQ's observations on this critical current issue for organizations.

09/11/2006 Data Mash-ups Trigger Innovation and Productivity Gold Club Protected
What are Data Mash-ups? It is certainly not a familiar term in enterprise software and might even send a shiver down the spine of a datablase administrator. Yet some large corporations and government agencies are using this concept to get closer to their customers, have a better pulse on their business, monitor and understand external threats and opportunities, or simply get access to information that cannot be obtained any other way. Download this white paper and learn more!
08/02/2006 Decision Services: The Next SOA Challenge Gold Club Protected
Without visibility and easy access into the decision services available for reuse, multiple versions of services will result, creating a serious problem when services need to be changed. Read about how Transparent Decision Services is a better approach to enhancing SOA flexibility and services reuse É because what you see is what you get.
07/12/2006 SOA Worst Practices Gold Club Protected

How many times have you heard: "Security for your service-oriented architecture [SOA] should be tight enough to be secure, but not so rigid as to impact flexibility or performance?" Did you think: Hey, how do we measure this?

You're not alone - and we're not just saying that to make you feel better. These and other SOA best practices offer good advice and value, but applying them to your business can be tricky. After all, best practices don't always relate to your specific situation or business model.

In this guide, you'll learn about real-life (and real lame) mistakes made by your peers! We'll share with you the thinking behind these ideas, why they failed, and better approaches that can help you achieve a more successful outcome. (In other words, you will be smarter after reading this. Really.)

06/29/2006 Efficient Business Processes Need More Than an Online Application Form Gold Club Protected
Some time last century the dream of lean, efficient, profitable businesses everywhere was to become paperless. Compliance regulations have actually made that elusive, due to stringent requirements for proof of identity and recordkeeping. Since there are many examples of why a ‘paperless’ organization with fully automated, straight-through processing, may remain a dream, a more pragmatic approach is required that enables documents to become part of efficient, integrated business processes.
04/21/2006 SOA Appliance Case Studies - Web Services Meet the Network Gold Club Protected
In this customer case study whitepaper, noted analyst Jon Oltsik, of Enterprise Strategy Group, discusses the demands of XML Web services by highlighting four (4) end-user network deployments using IBM WebSphere DataPower SOA appliances. These new hardware products from IBM help to provide superior Web services security, ESB connectivity in a hardware form factor, legacy reuse & scalable XML for SOA. Jon Olstik also introduces the notion of the persistent network application processing model, an innovative model that utilizes intelligent devices like WebSphere DataPower SOA appliances to consolidate specific SOA services and XML processing on the network itself. Download the white paper now to learn how IBM can help you simplify, help secure and accelerate your SOA.
Start Next

Explore Our Topics

  • EDITOR'S BRIEFING
  • Virtual Conferences
  • Webinars
  • Roundtables

BPM in Action

March 10, 2011

The sixth annual BPM in Action 2011 Virtual Conference will explore cutting-edge market developments in BPM and describe how to leverage them for improved business operation and performance. More

View All Virtual Conferences

Smart Case Management: Why It's So Smart.

Date:Nov 05, 2009
Time:12:00 PM ET- (17:00 GMT)

REGISTER TODAY!

Date:Oct 29, 2009
Time:15:00 PM ET- (19:00 GMT)

REGISTER TODAY!
View All Roundtables
  • Research Library
  • Podcasts
  • News

Joe McKendrick: Part II of II: Designing Evolve-ability into SOA and IT Systems

In part two of Joe McKendrick's recent podcast with Miko Matsumura, chief strategist for Software AG, they talk about how SOA and IT systems need to change and grow and adapt with the organization around it.

Listen Now

Phil Wainewright: Helping Brands Engage with Social Media

Phil Wainewright interviews David Vap, VP of products at RightNow Technologies, and finds out how sharing best practices can help businesses understand how best to engage with online communities.

Listen Now

Peter Schooff: Making Every IT Dollar Result in a Desired Business Outcome: Scott Hebner of IBM Rati

Scott Hebner, Vice President of Marketing and Strategy for IBM Rational, discusses a topic on the top of every company's mind today: getting the most from IT investments.

Listen Now

Jessica Ann Mola: Where Will BI Fit In? Lyndsay Wise Explains

In BI, this tough economy and the increasing role of Web 2.0 and MDM are certainly topics on people's minds today. WiseAnalytics' Lyndsay Wise addresses each of them in this informative podcast.

Listen Now

Dennis Byron: Talking with...Deepak Singh of BPM Provider Adeptia

Deepak Singh, President and CTO of Adeptia, joins ebizQ's Dennis Byron in a podcast that gets its hand around the trend of industry-specific BPM.

Listen Now
More Podcasts
  • Most Popular
  • Quick Guide
  • Most Discussed

Quick Guide: What is BPM?

Learn More

Quick Guide: What is Event Processing?

Smart event processing can help your company run smarter and faster. This comprehensive guide helps you research the basics of complex event processing (CEP) and learn how to get started on the right foot with your CEP project using EDA, RFID, SOA, SCADA and other relevant technologies. Learn More

Quick Guide: What is Enterprise 2.0?

A lot of people are talking about Enterprise 2.0 as being the business application of Web 2.0 technology. However, there's still some debate on exactly what this technology entails, how it applies to today's business models, and which components bring true value. Some use the term Enterprise 2.0 exclusively to describe the use of social networking technologies in the enterprise, while others use it to describe a web economy platform, or the technological framework behind such a platform. Still others say that Enterprise 2.0 is all of these things. Learn More