SOAP White Papers

SOAP is a protocol for exchanging XML-based messages over a computer network, normally using HTTP. SOAP forms the foundation layer of the Web services stack, providing a basic messaging framework that more abstract layers can build on.
Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
By: CollabNet     Published Date: Dec 20, 2011

Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption

Tags : cloud, development, alm, agile, software development, collaboration, dev team, production
    
By: CollabNet     Published Date: Dec 20, 2011

In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. Discover five tested and proven software development practices your team should be utilizing to accelerate software delivery.

Tags : agile, software development, continuous integration, alm, dev teams, accelerate delivery, developers, app dev
    
By: Coverity, Inc.     Published Date: Nov 01, 2010

This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: Coverity, Inc.     Published Date: Aug 16, 2010

voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: Coverity, Inc.     Published Date: Feb 26, 2010

Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety
    
By: Ping Identity     Published Date: May 05, 2009

With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory
    
By: M3 Consulting, Inc.     Published Date: Feb 03, 2011

Offshoring Is a Cost Effective Solution to Your IT Needs

Tags : software design, application development, web design, offshoring, it solutions, consulting, active directory, bandwidth management
    
By: GlobalSign     Published Date: Jan 11, 2011

White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.

Tags : code signing, digital certificate, pki, adobe air, digital signatures, secure code, .net, c++
    
By: Gartner, Inc     Published Date: Oct 28, 2010

New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.

Tags : emerging trends, emerging technologies, hype cycle, new technologies, it trends, active directory, bandwidth management, convergence
    
By: xmannnnn     Published Date: Aug 06, 2010

Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.

Tags : active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking, governance
    
By: Ping Identity     Published Date: May 05, 2009

Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
By: ZSL Inc.     Published Date: Sep 25, 2008

The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server

Tags : zsl, soap, java, wsdl, uddi, web service security, risk exposure, security
    
By: Xactis     Published Date: Feb 02, 2007

Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.

Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe
    

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.