web app

Results 1 - 25 of 996Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Nutanix     Published Date: Aug 22, 2019
Organizations can now fully automate hybrid cloud architecture deployments, scaling both multitiered and distributed applications across different cloud environments, including Amazon Web Services (AWS) and Google Cloud Platform (GCP). Ready to learn more about hyperconverged infrastructure and the Nutanix Enterprise Cloud? Contact us at info@nutanix.com, follow us on Twitter @nutanix, or send us a request at www.nutanix.com/demo to set up your own customized briefing and demonstration to see how validated and certified solutions from Nutanix can help your organization make the most of its enterprise applications.
Tags : 
    
Nutanix
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
    
Cisco Umbrella EMEA
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: TIBCO Software     Published Date: Jul 22, 2019
On-demand Webinar The current trend in manufacturing is towards tailor-made products in smaller lots with shorter delivery times. This change may lead to frequent production modifications resulting in increased machine downtime, higher production cost, product waste—and the need to rework faulty products. Watch this webinar to learn how TIBCO’s Smart Manufacturing solutions can help you overcome these challenges. You will also see a demonstration of TIBCO technology in action around improving yield and optimizing processes while also saving costs. What You Will Learn: Applying advanced analytics & machine learning / AI techniques to optimize complex manufacturing processes How multi-variate statistical process control can help to detect deviations from a baseline How to monitor in real time the OEE and produce a 360 view of your factory The webinar also highlights customer case studies from our clients who have already successfully implemented process optimization models. Spe
Tags : 
    
TIBCO Software
Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: Oct 10, 2019
Big Data- und Analytik-Workloads bringen für Unternehmen neue Herausforderungen mit sich. Die erfassten Daten stammen aus Quellen, die vor zehn Jahren noch gar nicht existierten. Es werden Daten von Mobiltelefonen, maschinengenerierte Daten und Daten aus Webseiten-Interaktionen erfasst und analysiert. In Zeiten knapper IT-Budgets wird die Lage zusätzlich dadurch verschärft, dass die Big Data-Volumen immer größer werden und zu enormen Speicherproblemen führen. Das vorliegende White Paper informiert über die Probleme, die Big Data-Anwendungen für Storage-Systeme mit sich bringen, sowie darüber, wie die Auswahl der richtigen Storage-Infrastruktur Big Data- und Analytik-Anwendungen optimieren kann, ohne das Budget zu sprengen.
Tags : 
    
Infinidat EMEA
Published By: ttec     Published Date: Sep 13, 2019
According to the annual report on fraud and internet crime published by the FBI’s Internet Crime Complaint Center (IC3), a staggering total of more than $2.7 billion was lost through online fraud and financial crime in 2018, the last full year available. And according to the Federal Trade Commission (FTC), there were more than 1.4 million fraud reports in that same time period. Many of these fraud events involved brand impersonation or illegal activities conducted via a brand’s website. In other words, the trust and faith the public has in your brand can be used as a cover for illegal activities, making fraudsters’ schemes appear authentic or trustworthy. To keep the trust within your brand, download the whitepaper to learn how and why identifying and stopping online fraud is essential.
Tags : 
    
ttec
Published By: Coyote Point Systems     Published Date: Sep 07, 2010
If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems
Published By: Amazon Web Services APAC     Published Date: Sep 19, 2019
Amazon Web Services (AWS) offers scalable, cost-efficient cloud services that public sector customers can use to meet mandates, reduce costs, drive efficiencies, and accelerate innovation. The procurement of an infrastructure as a service (IaaS) cloud is unlike traditional technology purchasing. Traditional public sector procurement and contracting approaches that are designed to purchase products, such as hardware and related software, can be inconsistent with cloud services (like IaaS). A failure to modernize contracting and procurement approaches can reduce the pool of competitors and inhibit customer ability to adopt and leverage cloud technology.
Tags : 
    
Amazon Web Services APAC
Published By: Ounce Labs, an IBM Company     Published Date: Jan 26, 2010
A range of application security tools was developed to support the efforts to secure the enterprise from the threat posed by insecure applications. But in the ever-changing landscape of application security, how does an organization choose the right set of tools to mitigate the risks their applications pose to their environment? Equally important, how, when, and by whom are these tools used most effectively?
Tags : 
owasp, ounce wagner, csrf, xss, cross-site scripting, sql, security management strategy, source code analysis
    
Ounce Labs, an IBM Company
Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob
    
ASG Software Solutions
Published By: Gigaom     Published Date: Oct 17, 2019
This free 1-hour webinar from GigaOm Research brings together experts in cybersecurity and automated remediation, featuring GigaOm analyst Jon Collins and a special guest from Puppet, Jonathan Stewart. The discussion will focus on how enterprise security and operations teams can significantly enhance their response to security threats via a collaborative, automated approach to resolution. Cybersecurity often feels like an asymmetric battle — while on one side, cybercriminals appear to manage their efforts efficiently on the dark web, enterprises often deal with the consequences individually, reliant on manual processes and tools. So, what can we learn from the perpetrators about how to coordinate a response to security threats when, or before, they happen? In this 1-hour webinar, you will learn: How cybercriminals and hackers work together to create and disseminate security threats What current challenges are faced by enterprises as they look to respond What options exist to deal wi
Tags : 
    
Gigaom
Published By: Gigaom     Published Date: Oct 16, 2019
This free 1-hour webinar from GigaOm Research brings together experts in IT infrastructure and cloud featuring GigaOm analyst Mark Thiele and special guest from Packet, Jacob Smith. The discussion will focus on what can be done if a business has a need or desire to run application environments outside public cloud; and, in the age of public cloud adoption, what can companies do to remain competitive from an IT perspective. Most companies aren’t professional data center or infrastructure builders, and they shouldn’t have to be. This is in fact a driver for cloud adoption. Price, Performance, Proximity, Pride and Politics are reasons why enterprises might need more control at times over their infrastructure. This 1-hour webinar will explore: The considerations an enterprise must make when looking for a private cloud solution Examples of what others have done with managed private cloud If Managed Private Cloud can be cost-competitive with Public Cloud or on-prem IT. The high-level defi
Tags : 
    
Gigaom
Published By: AWS     Published Date: Jul 24, 2019
Add more value to your business Independent Software Vendors (ISVs) are turning to the cloud to modernize their applications and get rid of their commercial database dependencies to improve application performance, lower total cost of ownership (TCO), and reach new customers. DB Best delivers the established processes and technology ISVs need to accelerate the modernization of applications still running on commercial databases to Amazon Aurora. This enables your customers to quickly get up-and-running on the cloud and drive greater business value through Amazon Web Services (AWS). View the webinar to learn how DB Best and AWS enable you to accelerate every stage of your application modernization journey – from evaluating the right migration path for your application, to following a proven and repeatable database migration process, to driving growth and reaching more customers.
Tags : 
    
AWS
Published By: AWS     Published Date: Jul 24, 2019
Modernize your applications quickly Many organizations are finding their legacy technology to be inadequate due to its rigidity and high costs. In search of more flexible and cost-effective solutions, many are turning to the cloud. Most Independent Software Vendors (ISVs), however, still build their solutions on commercial databases that are expensive and time-consuming for their customers to deploy and maintain. This is a significant undertaking that can hinder adoption. To address these challenges head on, ISVs can modernize their applications on Amazon Aurora, a database offering from AWS that combines the reliability and performance of commercial databases with the cost-effectiveness and flexibility of open source solutions. In this webinar, you will learn how Virtusa, an AWS Partner Network (APN) Premier Consulting Partner, can accelerate your application modernization journey and help you grow your business. PTNR_ipc-database-migration-icon_245×155_Mar-2019.png View the webin
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 01, 2019
By 2020, Gartner predicts 100% of new entrants to IT – and 80% of historical vendors – will offer subscription-based business models to their customers. These organizations are prioritizing the cloud over on-premises data centers and legacy software, so they can more efficiently deliver highly available, scalable, and cost-effective service offerings. To remain competitive, you need to modernize your approach to .NET development – and Amazon Web Services (AWS) is the ideal place to start. This whitepaper will explore best practices for containerizing your Windows workloads on AWS, including how to design your containers, which AWS services to leverage, and how to modernize your existing .NET applications for the cloud.
Tags : 
    
AWS
Published By: AWS     Published Date: Oct 03, 2019
Christian Elsenhuber - AWS & Carsten Duch - SUSE Join our webinar and learn more about the SUSE Cloud Application Platform on Amazon Elastic Kubernetes Service (Amazon EKS). The webinar will show you how SUSE accelerates the use of applications in containers. With integrated automation and customization features, SUSE helps your DevOps teams deliver container applications, accelerate innovation, and improve the responsiveness of your IT.
Tags : 
    
AWS
Published By: ZoomInfo     Published Date: Sep 07, 2010
Find and connect quickly with the right people, prospects, and opportunities to grow your sales pipeline and boost conversion rates. The ZoomInfo™ Database is the only source of business information combining the business web, community contributors, and professionals who post their own profiles-updated 24 hours a day, 7 days a week. Unlock the power of this data with our next-generation prospecting tool, ZoomInfo™ Pro, featuring rich segmentation, export capabilities, and list building. Add custom appends and lists to streamline revenue generation and maximize ROI. Start your free trial today.
Tags : 
zoominfo, sales, marketing, pipeline, conversion rates
    
ZoomInfo
Published By: Pitney Bowes     Published Date: Apr 20, 2009
This Executive White Paper, sponsored by Pitney Bowes Marketing Solutions, a provider of web-based marketing automation solutions, examines the competitive advantages offered by marketing automation portals and the potential impact of these types of portals on marketing campaigns deployed in complex, rapidly evolving markets.
Tags : 
pitney bowes, automated portals, marketing solutions, web-based marketing, competitive advantage, portal, channel marketing, sustainable
    
Pitney Bowes
Published By: Akamai Technologies     Published Date: May 24, 2017
Webanwendungen sind wertvolle Tools für Unternehmen aller Größen. Sie ermöglichen Kunden die Kommunikation mit Kunden, Interessenten, Mitarbeitern, Partnern und anderen IT-Systemen. Webanwendungen sind naturgemäß offen, interaktiv und stets zugänglich. In ihrem Bericht beleuchten die Analysten von Frost & Sullivan, welche Anbieter von Web Application Firewalls (WAF) es gibt, wie die aktuelle Bedrohungslage für Webanwendungen aussieht und wie die Anbieter diesen Bedrohungen durch Skalierung entgegentreten.
Tags : 
    
Akamai Technologies
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.