WHITE PAPER:
With the increased popularity of online video content, now is the time for publishers to experiment with online video as a new means of storytelling and offering an enhanced experience on their Web sites.
VIDEO:
Hear Kevin Hoyt, platform evangelist at Adobe, discuss building Ajax apps using the latest version of Dreamweaver CS4 and extending apps outside the browswer with Adobe AIR.
WHITE PAPER:
Whether your goal on the web is to inform, sell, entertain, or persuade, your site needs to meet the expectations of today's Internet users. Rich web pages, rapid fire communications, huge software downloads, and an expanding universe of digital media require a new approach to content delivery. Read this paper to see what Limelight has to offer.
WHITE PAPER:
This white paper details the evolution of traditional Web pages and applications, discussing the defining attributes of the emerging class of Rich Internet Applications (RIAs).
WHITE PAPER:
Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
WHITE PAPER:
This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
WHITE PAPER:
The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
EGUIDE:
Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.