SOAP White Papers

SOAP is a protocol for exchanging XML-based messages over a computer network, normally using HTTP. SOAP forms the foundation layer of the Web services stack, providing a basic messaging framework that more abstract layers can build on.
Results 1 - 17 of 17Sort Results By: Published Date | Title | Company Name
By: NodeSource     Published Date: Nov 20, 2017

Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.

Tags : nodesource, application development, javascript, web applications, open source, soa, application security, web service security, application performance management, java, soap, web development
    
By: NodeSource     Published Date: Nov 10, 2017

Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.

Tags : nodesource, xml, software development, digital transformation, open source, web applications, web development, java, .net, soap, infrastructure, business continuity, web service security, application performance management, customer satisfaction, ebusiness, web services, data protection, secure content management, business technology
    
By: CollabNet     Published Date: Dec 20, 2011

Why the Cloud Is Advantageous for Agile, and for Accelerating its Enterprise-wide Adoption

Tags : cloud, development, alm, agile, software development, collaboration, dev team, production, hosting, convergence, .net, c++, database development, java, middleware, open source, software outsourcing, quality assurance, scripting, soap
    
By: CollabNet     Published Date: Dec 20, 2011

In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. Discover five tested and proven software development practices your team should be utilizing to accelerate software delivery.

Tags : agile, software development, continuous integration, alm, dev teams, accelerate delivery, developers, app dev, database development, java, middleware, open source, quality assurance, scripting, soap, software testing, visual basic, web development, web services, xml
    
By: Coverity, Inc.     Published Date: Nov 01, 2010

This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
By: Coverity, Inc.     Published Date: Aug 16, 2010

voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
By: Coverity, Inc.     Published Date: Feb 26, 2010

Find out how Coverity has helped Frequentis ensure a high level of software integrity to support its product mission of freedom from failure, while continually improving the productivity of its developers.

Tags : coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
By: Ping Identity     Published Date: May 05, 2009

With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
By: Kingston     Published Date: Feb 15, 2011

Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization

Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory, server utilization, memory ballooning, vmkernal swapping, capacity planning, vmware esx 4.0, active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking
    
By: GlobalSign     Published Date: Jan 11, 2011

White Paper explaining the growing need for Digitally Signing Adobe AIR applications, and expanding the market reach of your application by distributing trusted code.

Tags : code signing, digital certificate, pki, adobe air, digital signatures, secure code, .net, c++, database development, java, middleware, open source, software outsourcing, quality assurance, scripting, soap, software testing, visual basic, web development, web services
    
By: Ping Identity     Published Date: May 05, 2009

Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.

Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
By: ZSL Inc.     Published Date: Sep 25, 2008

The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server

Tags : zsl, soap, java, wsdl, uddi, web service security, risk exposure, security, software development
    
By: Infor     Published Date: Apr 19, 2007

To all but the savviest technologists, today's typical Web-architected enterprise product diagram is a confusing jumble of acronyms and buzzwords and pledges of "true enterprise wide" deployments. Separating the hype from reality is critical for end-users to select enterprise products that deliver the full benefits of true enterprise Web deployment.

Tags : enterprise software, deployment, web deployment, architecture, j2ee, eam, enterprise asset management, ejb, web architecture, infor, erp, software development, soap, web development, web services, xml, web service management
    
By: Xactis     Published Date: Feb 02, 2007

Learn the 'bottom-up' approach to start Business Rules Extracting, Migrating and Auto Re-architecting your current mission-critical legacy system and their data, into an SOA.  This is a "how-to" presentation addressing how to get started and eventually establish an internal L2S Center of Excellence.

Tags : soa, service oriented architecture, service-oriented architecture, business rules extracting, legacy system, erp, enterprise resource planning, mainframe, citrix, xactis, application integration, application performance management, business analytics, business integration, business process automation, business process management, .net, c++, java, middleware
    

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.