Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web traffic

Results 51 - 75 of 88Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security, cybersecurity, networking, enterprise applications
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 09, 2017
For many financial institutions, traffic from bots (aggregators, scrapers, crawlers) can account for up to 40-60% of their overall website traffic — from good bots engaged in essential business tasks to bad bots performing harmful activities. Banks, traders, asset managers, and insurers might know how much of their traffic is from bots, but what they may not know is the impact those bots may be having on their business. Read the report to learn more about: • Managing Financial Data Aggregators • How Bots Affect the Digital Experience • What a good bot looks like?
Tags : 
financial services, financial data, bots, bot management, website traffic, the digital experience
    
Akamai Technologies
Published By: Amazon     Published Date: Nov 07, 2013
This planning and implementation guide discusses planning topics, architectural considerations, and configuration steps relevant before and after launching the necessary AWS services such as Amazon Elastic Compute Cloud (Amazon EC2) and Amazon Virtual Private Cloud (Amazon VPC) to run a high-availability and site-resilient Exchange architecture.
Tags : 
amazon web services, microsoft exchange, aws cloud, cloud, web services, servers, processor, memory, storage, log replication, network traffic, resiliency, availability, configuration, deployment
    
Amazon
Published By: Trilibis Mobile     Published Date: Aug 14, 2012
Smartphones and tablets are overtaking web traffic. Read about "mobile first" strategy and learn best practices for overcoming the challenges of developing mobile websites and hybrid apps in a rapidly evolving market.
Tags : 
mobile web, mobile strategy, trilibis, hybrid apps, mobile first, smartpath, html5, mobile design, mobile development, mobile websites, msite, adaptive design, responsive design, proxy site, tablets, best practices, javascript, mobile apps, native apps, web app
    
Trilibis Mobile
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management
    
Cisco
Published By: Oneupweb     Published Date: Jun 24, 2008
Paid Search produces results. Learn when, where and how with Oneupweb's white paper, Paid Search: Follow the Money.
Tags : 
oneupweb, paid search, paid, ppc, online marketing, lead generation, traffic, conversion rates, sales, cpa, brand recognition, online advertising, google, yahoo, marketing, natural search engine optimization, seo, search engine marketing, sem, keywords
    
Oneupweb
Published By: Schneider Electric     Published Date: Jan 26, 2018
The 4th and final event in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." Customers have lots of decisions to make as they feel their way through the changing IT landscape. Which infrastructure and applications should stay on their own premises (if any) and what can they safely move to the cloud? Fill out your information and click "Register" to watch the fourth and final event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Should I Stay or Should I Go?” This webinar originally aired on December 7th, 2017. This final webinar in our webinar series is focused on ways partners can help customers answer the types of questions above and, in the process, become trusted advisors. We’ll go over how to use tools including the EcoStruxure IT suite to analyze customer traffic and help them decide the best home for each application, whether on-premises or in the cloud. (Hopefully we’ll figure out a way to work in the classic Clash tune as well!)
Tags : 
    
Schneider Electric
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
Tags : 
globalsign, hackalert, blacklisting, malware, drive by downloads, malware distribution, hacked websites, malware injection
    
Globalsign Inc.
Published By: Adobe     Published Date: May 15, 2014
From web-enabled wristwatches to high-resolution tablets, new mobile devices are popping up all the time, and customers expect your content to work flawlessly and look great across all of them. But that doesn’t mean you have to keep re-inventing your digital assets for every new innovation.
Tags : 
adobe, web design, responsive web design, brand awareness, customer engagement, web analytics, smartphone, tablet, online marketing, web experience, web presence, roi, conversion rates, traffic, web development
    
Adobe
Published By: ICG Commerce     Published Date: Jan 28, 2008
A new guide from Fathom SEO explains how businesses can maximize search engine marketing efforts by adopting a holistic management plan for Pay-Per-Click and Search Engine Optimization. Learn how to effectively share data about keywords, ad copy and landing page performance.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, ppc, pay per click, keywords, traffic generation, site traffic, web traffic, fathom, fathom seo
    
ICG Commerce
Published By: Fathom SEO     Published Date: Jan 28, 2008
A new guide from Fathom SEO explains how businesses can maximize search engine marketing efforts by adopting a holistic management plan for Pay-Per-Click and Search Engine Optimization. Learn how to effectively share data about keywords, ad copy and landing page performance.
Tags : 
seo, search engine, sem, search marketing, search engine marketing, ppc, pay per click, keywords, traffic generation, site traffic, web traffic, fathom, fathom seo
    
Fathom SEO
Published By: Vocus, Inc     Published Date: Dec 16, 2008
Identify ways to increase rankings in search engines and drive traffic to your website.  Get tips to optimize your press releases for search engines—reach a broader audience, deliver your message & drive traffic to your website.
Tags : 
seo press release, seo press releases, optimized press release, vocus, search engine optimization
    
Vocus, Inc
Published By: GeoTrust     Published Date: Oct 06, 2014
As the backbone of web security, secure sockets layer (SSL) technology is a must for securing sensitive data passing over the Internet — whether that's e-commerce traffic, remote access to internal servers, or other secure communications. Usually, one SSL certificate secures just one domain name or URL; however, some common situations are better handled with a type of certificate that allows multiple domains to be secured with just one certificate. Read this guide to learn about typical situations where multiple domain certificates are the ideal solution, how multiple domain certificates work, and how to select the right multi-domain certificate for your needs.
Tags : 
ssl, domains, sensitive data, e-commerce traffic, internal servers, secure communications, multiple domains
    
GeoTrust
Published By: MobileIron     Published Date: Feb 12, 2019
The speed at which technologies evolve is all but a cliché, and nowhere is that speed more apparent than in the rise of mobile. The mobile tipping point—the point at which more people used mobile devices to access the web than desktop devices—came in the first quarter of 2017, when 50.03% of global web traffic was from mobile devices. Today, mobile is the de facto standard. Simply put, if you are not already building your business on the assumption that your digital visitors are using mobile, you are missing the mark.
Tags : 
    
MobileIron
Published By: Webmarketing123     Published Date: Oct 06, 2010
There are many ways to increase revenue for your business. One of them is to evaluate and improve the success of your company's website in search results. SEO (Search Engine Optimization) is the practice of optimizing a website so that it achieves higher organic rankings on search engine sites like Google, Yahoo and Bing. In fact, according to the 2009 Forbes Ad Effectiveness survey, SEO is the most effective marketing channel today.
Tags : 
webmarketing123, seo, search engine optimization, google, yahoo, bing, search, keywords, analysis, traffic
    
Webmarketing123
Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Mediative     Published Date: Jan 14, 2008
More and more, companies are realizing the importance of creating a strong online presence both in the free organic search results and the paid advertisements that appear alongside those results. The tracking features of website logs and the measurability of pay-per-click ads enable marketers to monitor the traffic of their organic listings and the performance of their online advertising campaigns. However, it's comparatively more difficult to determine how the placement of those search listings and online ads affect consumer brand perceptions.
Tags : 
search marketing, organic search, buying behavior, buying behaviors, ctr, search, branding, google, eyetracking, heatmapping, heatmap, enquiro, enquiro research
    
Mediative
Published By: Appcito     Published Date: Apr 09, 2015
Elastic Load Balancing automatically distributes incoming web tra?c across multiple EC2 instances. With Elastic Load Balancing, you can add and remove EC2 instances as your needs change without disrupting the overall ?ow of information. If an EC2 instance fails, Elastic Load Balancing automatically reroutes the tra?c to the remaining running EC2 instances. If a failed EC2 instance is restored, Elastic Load Balancing restores the tra?c to that instance.
Tags : 
cloud architect, web traffic, elastic load balancing, information flow, load balancer, application security, amazon web services, aws, visibility, networking
    
Appcito
Published By: IBM     Published Date: Apr 06, 2015
How effective is your mobile app development process when it comes to meeting customer needs and business objectives? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift.” IBM customer, Bank of Montreal, also shares their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction. And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, customer-facing applications, enterprise applications, ibm, mobile moments, traffic, sales, productivity, brand satisfaction, software development
    
IBM
Published By: IBM     Published Date: Apr 16, 2015
How effective is your mobile app development process when it comes to understanding customer needs and delivering the right apps at the right time? IBM commissioned Forrester to identify the key drivers of successful mobile apps and the costs of failure -- for both customer-facing and enterprise applications. Watch the webcast to understand the key cost drivers and why it’s more important than ever to get this right due to what Forrester calls the “mobile mind shift” and the competitive reality of “mobile moments.” We also invited our customer, Bank of Montreal, to share their mobile app dev story. A good app can increase traffic, sales, productivity and brand satisfaction (see what happened for the Bank of Montreal). And a bad app will do the opposite (you could risk doubling your costs if you’re not mindful of the key cost drivers).
Tags : 
mobile app development, mobile apps, ibm, forrester, mobile mind shift, brand satisfaction, mobile, wireless
    
IBM
Start   Previous    1 2 3 4    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.