Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it service

Results 201 - 225 of 5526Sort Results By: Published Date | Title | Company Name
Published By: Appcito     Published Date: Apr 09, 2015
Social media marketing ?rm ViralMint rolled out a new feature that proved so popular that the increased customer tra?c swamped the capabilities of the existing load balancer solution and greatly increased application response times. Lacking visibility into the volume or nature of its tra?c, ViralMint had no clues for how to address its issues. A fortuitous conversation led to discovery of the Appcito Cloud Application Front End (CAFE) service, which allowed ViralMint to gain control of its cloud application tra?c, retain its customers’ trust and build on its unexpected success.
Tags : 
customer traffic, load balancer solution, application response times, visibility, cloud application service, cloud application delivery, aws, amazon web services, enterprise applications, cloud computing
    
Appcito
Published By: AppDynamics     Published Date: Dec 10, 2014
Learn the 10 best practices to perfect your application performance management strategy and see how your organization can greatly improve the efficacy and reliability of your IT service delivery.
Tags : 
application performance, monitoring tools, strategic initiative, it organization, user experience
    
AppDynamics
Published By: AppDynamics     Published Date: Aug 26, 2015
Strategies to energize your digital business.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure
    
AppDynamics
Published By: AppDynamics     Published Date: Aug 25, 2015
In collaboration with Enterprise Management Associates (EMA), AppDynamics has conducted a survey of application management professionals and managers to determine exactly what IT organizations want and need from APM providers. Here are some key findings from the research: • Only 30% of companies currently have application-specific solutions to monitor apps • 50% or fewer of the tools companies have purchased are actively being used to monitor apps • 27% of application-related problems are detected by monitoring tools • A “unified monitoring platform” is the top choice in a feature of an APM solution Download the full report to review the findings and understand the key challenges and “must haves” associated with APM solutions voiced by IT professionals themselves.
Tags : 
business technology, digital, customer service, efficiency, operations, infrastructure, business intelligence, business management, productivity
    
AppDynamics
Published By: AppDynamics     Published Date: Nov 02, 2017
Microservices are a type of software architecture where large applications are made up of small, self-contained units working together through APIs that are not dependent on a specific language. Each service has a limited scope, concentrates on a particular task and is highly independent. This setup allows IT managers and developers to build systems in a modular way. In his book, “Building Microservices,” Sam Newman said microservices are small, focused components built to do a single thing very well.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Nov 02, 2017
Thanks to the rise of containers and microservices, the rate at which new application projects are moving into production environments is accelerating exponentially. Developers have been employing containers for some time to speed development of applications. But the arrival of these applications to production environments inevitably creates new challenges for IT operations teams, since most IT monitoring tools don’t provide visibility into the containers that make up those microservices. As those container applications move into production, IT operations teams suddenly are finding themselves potentially flying blind.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Feb 08, 2018
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Apr 11, 2017
This eBook explains how to gain a deep dive on the essentials of microservices, including the characteristics of the technology, its meaning as a business initiative.
Tags : 
microservices, api, it management
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
Azure has been through many rounds of changes that have significantly affected the ways in which .NET and other developers interact with the platform. The shift in strategy has been rocky at times. In 2011, technology reviewers described Microsoft Azure as a confusing platform with a difficult to use web-based interface and incomprehensible documentation. Since then, the teams working on the platform have gradually improved it, resulting in a much more user-friendly platform that offers a well-organized array of services.
Tags : 
mobile developers, microsoft azure, xamarin, it operations, developer market, container
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
A microservice architecture provides benefits in the areas of service isolation and deployment as well as independent scalability. These benefits lead to more rapid release cycles and better use of available resources. But a microservice architecture also presents a host of new challenges in both deployment as well as performance management. The benefits to microservices far outweigh their challenges and, by identifying them early, you can plan for and ensure that your adoption of a microservices architecture goes smoothly.
Tags : 
microservice, management, business transactions, hybrid cloud, docker, environment
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : 
mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Dec 08, 2017
This white paper describes how containers and microservices work, the benefits and challenges of using them, and how a unified view of the enterprise stack and effective application performance monitoring (APM) can help to fortify their benefits and address their challenges
Tags : 
    
AppDynamics
Published By: AppFirst     Published Date: Oct 10, 2013
White Paper: The Need for Application Operations in the Dynamic Data Center and the Cloud.
Tags : 
appfirst, it as a service, cloud computing, cloud, data center, apm, application performance, server monitoring, it management
    
AppFirst
Published By: Appian     Published Date: Sep 15, 2010
This report examines the implementation of technology from Appian within Pinnacle People, a private provider of welfare-to-work services to the UK Government.
Tags : 
appian, bpm implementation, business process management, pinnacle people
    
Appian
Published By: Applause Israel     Published Date: Jun 19, 2018
obile Payments have emerged as a catalyst for transactions across all markets. In underdeveloped markets, mobile payment technology is enabling businesses to sell products and services to consumers that had previously been out of reach. In developed markets, it has made the process of purchasing products and services even simpler. PayPal, one of the most popular digital payment solutions on the market, facilitated $66 billion in payment volume throughout 2015, and now has 188 million active registered user accounts across the US. Furthermore, Statista projects that mobile payments will account for more than $210 billion in transactions by 2019. Mobile payment technology is a step forward in the process of connecting businesses to the people they are serving. However, some merchants will find themselves miles behind their competitors by the time the transition to mobile payments is complete. The reason? A failure to implement the correct mobile payment strategy. An ever-increasing numbe
Tags : 
    
Applause Israel
Published By: AppSense     Published Date: Nov 26, 2012
Read how AppSense Application Manager provides the only URM solution that dynamically controls end-user rights with surgical precision, providing users with the rights they need while increasing security and reducing IT costs.
Tags : 
user rights management, appsense, desktop security, windows optimization, it service requests, secure apps, user productivity, rights management
    
AppSense
Published By: AppZen     Published Date: Aug 02, 2019
Go beyond just matching invoices, receipts and purchase orders Identify duplicates Check prices and payment terms Enforce discounts Highlight compliance issues Validate contractor activity Discover fraud Confirm fulfillment of goods and services
Tags : 
    
AppZen
Published By: Apstra     Published Date: Feb 21, 2019
IT organizations are facing new challenges as a result of digital transformation, widespread cloud and SaaS adoption, mobile proliferation and pervasive IoT deployments. They must build and operate their internal data centers to deliver high availability for mission critical applications, rapidly onboard new applications and scale capacity on demand – all within the mandate to be cost competitive with infrastructure as a service providers (IaaS) like AWS and Azure. They are architecting and building new Intent-Based Data Centers to deliver private cloud services to their internal and external customers.
Tags : 
saas, data center automation
    
Apstra
Published By: Apstra     Published Date: Feb 25, 2019
This in-depth white paper explains how service providers are capitalizing on Intent-Based Networking — a new and effective networking model that provides a way of abstracting an application, feature, network, or resource in such a way that the intent is exposed, but the implementation is hidden.
Tags : 
apstra, intetn-based networking
    
Apstra
Published By: Apstra     Published Date: Aug 19, 2019
AOS delivers powerful, intent-driven automation of network services in vendor-agnostic environments by delivering it as an easily consumable service in response to consumer-specified intent. Network devices serve packets, AOS services serve application workloads. According to numerous studies, 70-80% of outages are due to configuration change applied to a living system, and not due to initial deployment. Initial, one-time deployment can be seen as sort of a “hello world” application; the real complexities arise as the system evolves. With AOS, configuration, telemetry, and expectations are derived from the single source of truth - the intent - in an idempotent fashion, and as such there is no implementation difference between initial deployment or change management.
Tags : 
    
Apstra
Published By: Arbor     Published Date: Sep 20, 2013
In this white paper, John Pescatore of SANS Institute explores how DDoS is used as part of advanced targeted attacks (ATAs) and describes how DDoS detection and prevention tools and techniques can be used against ATAs as well. Today’s DDoS attacks, as damaging as they are, sometimes mask even more threatening and dangerous advanced targeted threats. The good news is that some of the same tools that can detect the footprints of DDoS attacks can also find the telltale signs of ATAs. To be successful, though, enterprises need to coordinate their use of both types of logs and adjust their monitoring parameters correctly. They must also eliminate operational gaps, such as unclear lines of security authority, and limit the use of managed security services that can deprive enterprise security managers of the data they need to detect and stop DDoS attacks and ATAs.
Tags : 
distributed denial of services, ddos attack, ddos detection, ddos mitigation, security, advanced targeted attacks, mitigation, detection
    
Arbor
Published By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : 
arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud, cloud migration, high-bandwidth attacks, volumetric attacks, deployment, multi-vector threat, ips solutions, deployment models, security, infrastructure
    
Arbor
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.