Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web ui

Results 101 - 125 of 621Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Mar 20, 2013
Attend this Web Event series to learn about new product releases from HP Software which help break down traditional silos of planning, building and running applications in order to increase visibility, collaboration, and more for your firm.
Tags : 
enterprise agility, hp release, agility, it management
    
HP
Published By: WebiMax     Published Date: Oct 29, 2014
In most use cases involving flash storage deployments, the business environment changes, driving a need for higher-performance storage. However, the case of Epic Systems Corporation software is the opposite—the storage requirements haven’t changed recently, but the options for addressing them have. Epic, a privately-held company founded in 1979 and based in Verona,Wisconsin, makes applications for medical groups, hospitals and other healthcare organizations. Epic software typically exhibits high frequency,random storage accesses with stringent latency requirements. IBM has been working with Epic to develop host-side and storage-side solutions to meet these requirements. Extensive testing has demonstrated that the combination of IBM® POWER8™ servers and IBM FlashSystem™ storage more than meets the performance levels Epic recommends for the backend storage supporting its software implementations—at a cost point multiple times lower than other storage alternatives.
Tags : 
webimax, ibm, flashsystem storage, epic systems corporation, epic requirements, performance levels, it management
    
WebiMax
Published By: BMC Software     Published Date: Jul 22, 2015
In this on-demand webinar, you will hear about the results of a Forrester Consulting study with 432 IT practitioners that shows why capacity management is essential to your cloud transformation strategy and provides guidance on how you can get started.
Tags : 
capacity management, cloud, cloud strategy, cloud workload
    
BMC Software
Published By: JBoss Developer     Published Date: Feb 05, 2016
IT organizations are constantly faced with the challenge to produce high-quality solutions with a lower total cost of ownership (TCO). With the growing recognition that open source software provides quality, stable solutions, migrations of existing enterprise applications to products such as JBoss® Enterprise Application Platform have become increasingly popular. JBoss Enterprise Application Platform provides a holistic solution that includes tools for such business challenges as business process management, enterprise application integration, and serviceoriented architectures (SOA), enterprise portals, and data services solutions.
Tags : 
ibm, websphere, jboss, eap, migration, jboss, red hat, enterprise application platform, it management
    
JBoss Developer
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 10, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: Dyn     Published Date: Oct 04, 2016
With nearly 80% of businesses experiencing four or more disruptions to their site each month, Aberdeen Group recently conducted a study to get to the root of today's internet performance challenges. Read the findings and discover how companies: Improve resolution times resulting from web outages - 65% of companies experience an hour or more to repair an internet related outage Increase customer satisfaction by 30% - A consistent, reliable and fast web experience is your key to happy, loyal customers Protect revenue - 60% of businesses record a minute of downtime resulting in a $1,000 loss in revenue Are your online services and sites built for resiliency or destined for the headlines? Get the report to find out how leading organizations are bucking the stats and implementing Internet Performance Management (IPM ) tools to boost time to resolution and improve site performance.
Tags : 
performance management, website, internet, dns
    
Dyn
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application
    
Qualys
Published By: B Channels     Published Date: Dec 03, 2018
With NetBackup™ 8.1.2, the most common activities can now be accomplished within a few clicks or touches, thanks to the new intuitive, web-based UI. Authorize secure, self-serve access for a variety of other users with different roles from your desktop or mobile device. Not ready to switch to the new UI just yet? The classic NetBackup UI is still there for you.
Tags : 
    
B Channels
Published By: Monetate     Published Date: Dec 18, 2014
You have 60 minutes to capture your website visitor’s attention. Within that timeframe, nearly 75% of your customers will visit your site, make a decision on what to buy, and complete the checkout process. If they don’t, chances are, they’ll move on. Regardless of the device a customer uses or the channel from which a customer is referred, nearly 75% of all purchases will be made in that window. And you’ll end up learning whether your customer acquisition and retention costs were worth it. Given the enormity of this statistic, we’re taking an in-depth look at that first hour in this EQ: that happens when, how customers behave, and what you should be doing to convert the most customers possible.
Tags : 
retention costs, benchmark data, customer acquisition, ecommerce quarterly
    
Monetate
Published By: CA Technologies     Published Date: Mar 06, 2015
OAuth offre all'utente il pieno controllo sulla delega dell'accesso a un'API. Questo consente l'integrazione tra servizi per conto di tale utente. Gli stessi fornitori web social che hanno reso popolare il modello costituito dall'esposizione di un'API per consentire agli sviluppatori di terze parti di arricchire le loro piattaforme, sono stati i primi ad applicare questi meccanismi di autorizzazione delegati. OAuth è stata definito nel 2006, per standardizzare i meccanismi di questo tipo.
Tags : 
    
CA Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
What digital trends are forcing CDN services to evolve? CDN services are changing, and web and application delivery professionals are navigating the evolving CDN landscape. Read the Forrester Research Report, "CDNs Extend to Web Performance Optimization and End-To-End Cloud Services" to learn what new capabilities are required from the Next Generation CDN.
Tags : 
cdns, akamai technology, web performance optimization, cloud services, network management, network performance, network performance management, servers, cloud computing
    
Akamai Technologies
Published By: Quick Base     Published Date: Dec 18, 2017
IT leaders are in a tough spot. Business leaders need help improving processes, but IT needs to focus resources on its own mission-critical innovation projects. Over the past 18 months IT backlogs have risen by 29%, resulting in growing tensions between IT and the business. Across industries, IT leaders are increasingly turning to no-code application development to free themselves from the burden of the backlog. In this 30-minute webinar, Adam Hoover, Solutions Engineer at Quick Base, Inc. will discuss how a no-code application development platform can enable you to drastically reduce your backlog and keep your team focused on the projects that have the greatest impact. He’ll cover how to identify partnership opportunities between the business and IT – and share three effective models for working together while maintaining high quality across the IT ecosystem.
Tags : 
    
Quick Base
Published By: TIBCO Software     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software
Published By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this latest Data Science Central webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team a
Tags : 
    
Trifacta
Published By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team and how to align skill set
Tags : 
    
Trifacta
Published By: Uberall     Published Date: Apr 12, 2019
Le store locator est une fonctionnalité incontournable de votre stratégie Web-to-Store : il convertit efficacement vos recherches en ligne en ventes hors ligne. Et bien qu’il puisse sembler être un outil relativement simple et fonctionnel, plusieurs facteurs peuvent littéralement révolutionner l’expérience utilisateur et démultiplier vos conversions. Uberall vous donne les clés d’un store locator optimisé : pour que vos clients vous trouvent - à chaque fois.
Tags : 
locator, uberall, store locator, location marketing, local listings, pages locales, ro-po
    
Uberall
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
    
Rackspace
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Aerohive     Published Date: Oct 27, 2015
Ce webinaire s’adresse à tous les professionnels de l’informatique qui veulent en savoir plus sur les réseaux sans fil, et souhaitent déployer ou étendre ces derniers dans leur entreprise
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.