Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web app

Results 351 - 375 of 1018Sort Results By: Published Date | Title | Company Name
Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Is data changing the way you do business?Is it inventory sitting in your warehouse? The good news is data-driven applications enhance online customer experiences, leading to higher customer satisfaction and retention, and increased purchasing.
Tags : 
it planning, data, data-driven applications, data challenges, data solutions, big data solutions, big data challenges, in-memory databases, web-abpplications, in-memory data grid, nosql, storage nodes, e-commerce applications, social applications, logisitcs applications, trading applications, data scaling, rest, memcached, hot rod
    
Red Hat, Inc.
Published By: Alere Wellbeing     Published Date: Feb 22, 2012
In this webinar, Dr. Steven A. Schroeder and Dr. John R. Hughes address the unique challenges of nicotine addiction and why a specialized, evidence-based approach is essential for generating positive outcomes.
Tags : 
alere, tobacco cessation, workplace, wellness, office wellness, employee
    
Alere Wellbeing
Published By: Workday     Published Date: Jan 09, 2019
The HR strategy at Zappos may be highly unorthodox, but it’s working. This webinar, sponsored by Workday, explores how Zappos transformed its HR experience by entrusting employees, recruiting talent that understands the company’s culture, and more.
Tags : 
    
Workday
Published By: OpTier     Published Date: Sep 28, 2012
In today's economy, businesses need to be always-on. In this webcast featuring guest speaker IDC Research Vice President, Mary Johnson Turner, we'll uncover how 2012's biggest trends are impacting Application Performance Management (APM).
Tags : 
cloud computing, analytics, mobility, application performance management, apm, apm solutions
    
OpTier
Published By: AppNeta     Published Date: Oct 28, 2013
Let’s face it, users are impatient. They demand a blazingly fast experience and accept no substitutes. While the effects of poor performance are obvious, it makes one wonder about the relationship between client latency and the “perception of speed”. After all, the user can trigger many state change events (page load, submit a form, interact with a visualization, etc.) and all these events have an associated latency to the client. However, are certain types of latency more noticeable to the user then others?
Tags : 
appneta, web applications, applications, applications latency, web applications latency, latency, client latency, time to first byte, ttfb, lag time, html, dom tree, css, stylesheet, content delivery network, cdn, javascript, network application, application performance management
    
AppNeta
Published By: AppNeta     Published Date: Oct 28, 2013
This article explores a new approach to assuring web-based application performance and the three key capabilities you need to ensure exceptional application delivery and end-user experience.
Tags : 
appneta, web application performance, web applications, application performance, deployment, latency, end user experience, response time, web performance optimization, delivery chain, network performance, apm, full stack, rum, stm, real user monitoring, synthetic transaction monitoring
    
AppNeta
Published By: AppNeta     Published Date: Oct 28, 2013
Performance for end users is the metric by which most businesses judge their web applications’ performance: is the responsiveness of the application an asset or a liability to the business? Studies show that users are growing more and more demanding, while average page-loads are getting bigger and bigger. Combine that with frequent releases and cross-business updates, and pretty soon the optimization job is never quite done.
Tags : 
appneta, application performance, rum, real user monitoring, synthetic monitoring, optimization, application performance management, apm, application operations, synthetic transaction monitoring, javascript, css, ajax, infastructure monitoring, transaction tracing, customer satisfaction
    
AppNeta
Published By: dynatrace     Published Date: Feb 01, 2013
Studies have shown that poor performance of e-commerce web sites can directly result in loss of revenue, poor customer satisfaction and damaged reputation. This white paper provides an overview to application performance management for e-commerce.
Tags : 
    
dynatrace
Published By: Lenovo     Published Date: Sep 16, 2014
Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, isn’t it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services can be most compatible, agencies can take a smarter approach to these difficult decisions. See the tradeoffs in plain English, and learn why more agencies are taking notice to emerging cloud technologies through this exclusive executive summary.
Tags : 
vdi, cloud alternatives, byod demands, emerging web technologies
    
Lenovo
Published By: Waratek     Published Date: Mar 23, 2015
Waratek has developed a disruptive new approach to application security that protects applications and sensitive data from attacks like SQL Injection, zero-day and unpatched vulnerability exploits at runtime, without code changes or hardware devices.
Tags : 
application security, runtime application self protection, web application security, sql injection, zero day attack, zero day vulnerability, legacy java code, virtual patching, open source vulnerabilities, owasp, cloud security, gartner research report, threat forensics, advanced persistent threat, security
    
Waratek
Published By: MobileIron     Published Date: Feb 14, 2019
What if you could protect your company from data loss before a mobile attack occurs? The reality is that mobile threats are everywhere and the risks are escalating. But in the world of modern work, how can IT protect mobile devices while allowing users easy access to corporate data on a device of their choice anytime, anywhere? Watch this webinar on demand to learn how mobile threat defense is reducing risks amongst some of the largest mobility programs in the world. We will reveal: -How mobile attacks are targeting corporate data, bypassing traditional IT defenses -Why threat detection and remediation protects your data, without disrupting user productivity -Why mobile threat detection is an essential component of a layered defense architecture With one app, MobileIron Threat Defense delivers unparalleled mobile threat detection and remediation on-device without network connectivity required, and no need for users to take any action.
Tags : 
    
MobileIron
Published By: BlackLine     Published Date: Aug 06, 2018
When did reconciliations become a living nightmare? Demanding deadlines. Strict requirements for review and supporting documentation. Endless piles of reconciliations to approve?that were due yesterday. Reconciliations are one of the most labor-intensive, yet critical controls processes within any organisation. Even the smallest mistake can compromise the integrity of your balance sheet and create discrepancies in your financial close. There is a simpler way to perform your reconciliation process that allows you to focus on analysis, risk mitigation, and exception handling. Join us for this webinar to find out what this is. You will learn how to: Automate daily reconciliations for continuous control and validation Gain better visibility into the quality, accuracy, and timeliness of a reconciliation Develop a seamless and streamlined workflow for preparation, approval, and review
Tags : 
    
BlackLine
Published By: Genesys     Published Date: Feb 08, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Avant d’appeler votre centre de contacts, la plupart des clients actuels auront déjà ou seront en train de visiter votre site web. Et pour eux, l’agent d’assistance devra le savoir au moment de prendre l’appel et ainsi leur offrir une expérience personnalisée. En d’autres termes, l’agent devra disposer d’un historique complet de leurs interactions. Or, de nombreuses entreprises peinent à relier tous ces points de contact. De fait, elles se retrouvent incapables d’offrir une expérience homogène sur tous les canaux, possible uniquement lorsque les agents disposent d’une visibilité complète sur les parcours des clients. Posez-vous deux questions. Votre infrastructure est-elle assez flexible pour prendre en charge de nouveaux canaux d’engagement client ? Intégrez-vous facilement de nouveaux canaux (vidéo, réseaux sociaux, SMS) à cette infrastructure ? Cet eBook explique comment résoudre ces problématiques et poser les bases d’une infrastructure capable de relever les défis de demain
Tags : 
    
Genesys
Published By: Genesys     Published Date: Feb 12, 2019
Customers today expect their customer service to be as connected as they are. If you can’t deliver a seamless omnichannel customer experience or easily add digital channels such as mobile, social media and web, you risk being left behind. Some companies try to deliver omnichannel with dated technology, a tangle of point solutions, bolted together with duct tape. But you don’t have to. Read this ebook and see: Why force-fitting more channels into an aging infrastructure is not the right approach How to create a future-ready customer experience How an integrated approach improves your metrics and reduces operating costs
Tags : 
    
Genesys
Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR
Published By: Entelo     Published Date: Sep 06, 2017
Today's tech candidates are actively interacting and sharing their work on different websites, networks, and forums. As more of these channels surface, recruiters have the advantage to connect with more people in real-time, build a community based on shared interests, and to develop their employer identity among candidates. This webinar will cover recruiting on Slack, Reddit, AngelList, and Meetup – a communication tool, aggregated news site and forum, Q&A social network, startup platform, and online portal for interest groups. Michelle Lusen, senior corporate recruiter at Slack, will join us for the webinar to share her best practices for connecting with candidates. In this webinar, you'll learn: How to establish rapport and develop a Slack community of candidates using private and public communication channels Where to look on Reddit and AngelList to find people most interested in hearing about your open role Tactics to identify and engage with domain experts on Meetup How to navi
Tags : 
    
Entelo
Published By: Fujitsu     Published Date: Dec 08, 2017
Join leading industry experts from Fujitsu, Salesforce and a special guest from Canon, as they share their expert insights on the future of Digital Enterprise and how manufacturing companies can accelerate their digital transformation journey. During this interactive discussion, they will: • Reveal how to identify and prioritize your critical issues; • Show how Canon Information & Imaging Solutions, is driving growth through an innovative outcome-based service model; • Demo a real-life digital transformation story; • Show how to see more, act fast, optimize, anticipate and power innovates your way to success. This webinar also features Fujitsu's unique digital transformation approach to help you understand where you are in your digital transformation journey and the actions you can take to accelerate it. Watch for this amazing webinar and a link will be sent to you via email.
Tags : 
fujitsu glovia, glovia enterprise planning software, digital transformation, fujitsu webinar
    
Fujitsu
Published By: Google Chrome Enterprise     Published Date: May 04, 2018
As enterprises contine to adopt web-based apps, users spend more time their web browser than ever before. With Chrome Browser, IT can set a variety of policies to help users be more productive across the web. From enabling security policies that protect users, to making to making it easy to access needed boomarks and extensions, IT can offer users a better browsing experience to support users as they get their job done.
Tags : 
    
Google Chrome Enterprise
Published By: Zerto     Published Date: Oct 08, 2018
IT professionals are under tremendous pressure to ensure IT Resilience and that business technology services are protected and available 24/7. In this webinar, Forrester’s Senior Analyst, Naveen Chhabra, explores the practices and technologies that have evolved to become the tech infrastructure needed to help organizations achieve true IT resilience and giving IT the tools they need. You will hear about: The state of the IT Resilience market.New and evolving approaches and technologies that are leading organizations to solve for IT resilience.The tools IT needs in order to focus on modernization and building a solid cloud strategy.
Tags : 
it resilience, business technology, forrester, tech infrastructure
    
Zerto
Published By: Shape Security     Published Date: Sep 12, 2019
A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. Not only were the attacks leading to account takeover fraud losses, but the sheer volume of attacks also put significant strain on the bank’s infrastructure. After months of playing cat-and-mouse with the attackers, the bank decided to seek out a sophisticated solution and approached Shape. In this case study, learn how Shape’s Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Tags : 
    
Shape Security
Published By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
    
Shape Security
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits
    
Webroot UK
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a Law Firm with rapid growth and globally dispersed locations addressed concerns about Web security.
Tags : 
protects, appleby, law firm, web security, it analyst, bandwidth, cloud-based
    
Webroot UK
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.