Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

web ui

Results 76 - 100 of 612Sort Results By: Published Date | Title | Company Name
Published By: VMWare - vFabric     Published Date: May 10, 2012
By migrating all web applications to VMware vFabric tc Server, DSD achieved fast testing and live deployments, proactive problem solving and high website availability. This case study is essential reading for anyone interested in quick turn around!
Tags : 
vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, networking
    
VMWare - vFabric
Published By: Oracle     Published Date: Dec 17, 2015
View this on demand webcast to learn tips from the head of Digital and Channel Sales for Ricoh America on building a modern, world-class B2B eCommerce organization.
Tags : 
oracle, modern b2b ecommerce, internet retailer, networking, enterprise applications, data center
    
Oracle
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: PGi     Published Date: Nov 07, 2018
Les webminaires diffèrent des réunions en ligne collaboratives basées sur l’échelle, le comportement des entreprises, les exigences des entreprises et les attentes des participants. Les webminaires sont des événements en temps réel avec de nombreuses personnes qui sont structurés, programmés, très évolutifs et qui offrent des présentations diffusées ainsi que le partage de l’écran, des votes, des sondages et des possibilités de chat. Par conséquent, ils exigent une organisation, une promotion, une réalisation et des calculs différents.
Tags : 
    
PGi
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Absolute Software     Published Date: May 31, 2016
The OCR conducts HIPAA audits of covered entities and their business associates and subcontractors. If HIPAA violations are discovered during these audits, the OCR will implement significant penalties. Additionally, since OCR is posting the details of every breach affecting 500 or more individuals on a public website1 , the organizations involved have become susceptible to class-action lawsuits.
Tags : 
best practices, business analytics, productivity
    
Absolute Software
Published By: Symantec     Published Date: Jul 09, 2017
This paper provides a brief recap of the functionality provided by web proxies, why proxy architecture is still a vital building block for a comprehensive web defense, and how web proxies can work with other solutions such as next-gen firewall (NGFW) to deepen the organization’s defenses against advanced web-based threats.
Tags : 
cybercrime, swg, secure web gateway, firewall, security., threat and vulnerability management
    
Symantec
Published By: Red Hat     Published Date: Jun 18, 2012
Join Red Hat's CIO Lee Congdon for a c-level discussion of the key considerations and benefits of building an Open Cloud Architecture.
Tags : 
red hat, on-demand webinar, private cloud, virtualized server, cloud computing, virtualization, networking
    
Red Hat
Published By: IBM     Published Date: Nov 28, 2011
Download this IBM white paper from Web Buyer's Guide to learn the next generation solutions for application servers.
Tags : 
solutions, applications, hybrid, computing, scaled-out, web-based applications
    
IBM
Published By: Schneider Electric     Published Date: Oct 17, 2016
Ce livre blanc présente une approche simple, supportée par des outils Web gratuits, permettant l’estimation de l’empreinte carbone d’un datacenter, quel que soit son emplacement à travers le monde.
Tags : 
    
Schneider Electric
Published By: Okta     Published Date: Mar 10, 2016
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
"The success of your digital strategy requires bridging the gap between your core capabilities and what customers want. Watch this on demand webcast with Forrester’s Vice President and Principal Analyst, Ted Schadler, Michael Fasosin, Chief Strategy Officer, Spindrift & DigitasLBi OSG, and Oracle to learn: - Key trends in consumer online shopping behavior - How to develop a successful digital experience technology strategy and roadmap - The essential components of a modern digital experience platform - How to achieve quick-wins and long term investments simultaneously You will also see a short demonstration of how Oracle's CX Cloud solutions deliver personalized, unified experiences across channels. "
Tags : 
    
Oracle Commerce Cloud
Published By: Puppet     Published Date: Jul 13, 2016
If you’re new to Puppet on Windows, one of the first things you’ll want to do is start managing users and groups. In this webinar, we’ll demonstrate how to manage both local groups and Active Directory membership. The demo will include: - Managing administrator accounts - Managing local groups - Setting up a domain controller - Managing Active Directory membership Puppet can do a lot, but we always recommend starting small and building on your success. Managing users and groups is a great way to get started. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: Puppet     Published Date: Aug 03, 2016
After you set up your users and groups, the next thing you’ll want to do is configure the software running on your machines. In this webinar, you’ll get a taste of the many kinds of services and packages Puppet can manage on Windows. We’ll present some common use cases that will help you get some quick wins under your belt, including: - Managing Windows services (Windows Time, Disk Defragmenter, etc.) - Installing packages - Managing Windows maintenance tasks via WMI by executing arbitrary PowerShell code - Creating scheduled tasks in the Task Manager Puppet can do a lot, but we always recommend starting small and building on your success. Make 2016 the year you banish manual configuration for good!
Tags : 
    
Puppet
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Schneider Electric     Published Date: Oct 11, 2019
Data center designs have become much more safe, reliable, & efficient. However, we must continue to adopt new designs & emerging technologies to stay ahead of the pace of change. In this webinar, Steve Wallage, Managing Director of BroadGroup Consulting, shares his expertise to help global colocation providers: 1. Learn what changes colocation providers can make to adapt to the marketplace 2. Understand the future requirements of hyperscale cloud players 3. Hear of successful projects around the world and why they succeeded
Tags : 
data center, business growth, schneider electric
    
Schneider Electric
Published By: Okta     Published Date: Aug 21, 2015
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Okta     Published Date: Aug 24, 2015
Large enterprises, SaaS providers and businesses with major web properties increasingly depend on Okta to handle authentication for their thousands or even millions of users. Learn about the technology and processes Okta has put in place in building a highly scalable platform that will be ready to securely store and serve billions of user identities.
Tags : 
    
Okta
Published By: Fortinet     Published Date: Feb 04, 2014
Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.
Tags : 
ngfw, next generation firewall, fortinet, security, it management, enterprise applications
    
Fortinet
Published By: HP     Published Date: Mar 20, 2013
Attend this Web Event series to learn about new product releases from HP Software which help break down traditional silos of planning, building and running applications in order to increase visibility, collaboration, and more for your firm.
Tags : 
enterprise agility, hp release, agility, it management
    
HP
Published By: WebiMax     Published Date: Oct 29, 2014
In most use cases involving flash storage deployments, the business environment changes, driving a need for higher-performance storage. However, the case of Epic Systems Corporation software is the opposite—the storage requirements haven’t changed recently, but the options for addressing them have. Epic, a privately-held company founded in 1979 and based in Verona,Wisconsin, makes applications for medical groups, hospitals and other healthcare organizations. Epic software typically exhibits high frequency,random storage accesses with stringent latency requirements. IBM has been working with Epic to develop host-side and storage-side solutions to meet these requirements. Extensive testing has demonstrated that the combination of IBM® POWER8™ servers and IBM FlashSystem™ storage more than meets the performance levels Epic recommends for the backend storage supporting its software implementations—at a cost point multiple times lower than other storage alternatives.
Tags : 
webimax, ibm, flashsystem storage, epic systems corporation, epic requirements, performance levels, it management
    
WebiMax
Published By: BMC Software     Published Date: Jul 22, 2015
In this on-demand webinar, you will hear about the results of a Forrester Consulting study with 432 IT practitioners that shows why capacity management is essential to your cloud transformation strategy and provides guidance on how you can get started.
Tags : 
capacity management, cloud, cloud strategy, cloud workload
    
BMC Software
Published By: JBoss Developer     Published Date: Feb 05, 2016
IT organizations are constantly faced with the challenge to produce high-quality solutions with a lower total cost of ownership (TCO). With the growing recognition that open source software provides quality, stable solutions, migrations of existing enterprise applications to products such as JBoss® Enterprise Application Platform have become increasingly popular. JBoss Enterprise Application Platform provides a holistic solution that includes tools for such business challenges as business process management, enterprise application integration, and serviceoriented architectures (SOA), enterprise portals, and data services solutions.
Tags : 
ibm, websphere, jboss, eap, migration, jboss, red hat, enterprise application platform, it management
    
JBoss Developer
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.