RSS feed Get our RSS feed

News by Topic

web service

Results 301 - 325 of 674Sort Results By: Published Date | Title | Company Name
By: Tealeaf     Published Date: Apr 14, 2011
This guide focuses on how to provide a more seamless customer experience for customers transitioning from the website (mobile or fixed) to the customer service center.
Tags : customer experience gap, customer service center, tealeaf, contact center, visibility, online experience, online channel, customer service optimization
     Tealeaf
By: Entrust Datacard     Published Date: May 15, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly. Entrust IdentityGuard Cloud Services SSL is a self-service application designed to streamline certificate management while providing secure certificates from a trusted brand in online security.
Tags : entrust, ssl, ecommerce, extended validation, digital certificates, web servers, identityguard, cloud
     Entrust Datacard
By: Entrust Datacard     Published Date: Jul 21, 2014
Managing the purchase, deployment, renewal and expiry of digital certificates for multiple Web servers, purposes and users — sometimes in many different locations — can be time-consuming and costly.
Tags : identity guard, cloud service, ssl, management, digital certification, multiple web servers, self-service, security
     Entrust Datacard
By: F5 Networks Inc     Published Date: Jan 22, 2009
The demand for (and benefits of) web-based interfaces combined with an increasingly mobile and distributed workforce has exposed inefficiencies inherent in the browser, the network and its protocols, and the data center. These inefficiencies create performance problems for applications that continue to be magnified by emerging technologies like Web 2.0 and SOA. This White Paper details how F5's approach to Application Delivery Networking eliminates the bottlenecks inherent in browsers, in the network, and in the data.
Tags : web acceleration 2.0., web-based interfaces, data center, soa, service-oriented architecture, application delivery networking
     F5 Networks Inc
By: Innotas     Published Date: Nov 22, 2010
A Roadmap To Driving Top-Down Alignment Between Business & IT Strategy.
Tags : innotas, cxo's guide, it governance, web 2.0 technologies, automation solution, network, it governance, enterprise services
     Innotas
By: Verio     Published Date: Jul 06, 2011
This paper summarizes the results of a multi-year research study covering over 40 countries and based upon responses from 3,000 small and medium businesses(SMBs).
Tags : verio, smb, resellers, managed services, website hosting, web site hosting, website hosting services, website hosting plans
     Verio
By: Verio     Published Date: Jul 06, 2011
This whitepaper will examine today's SaaS opportunities and challenges, and will show how a hosting company, such as Verio, can help ISVs capitalize on the rapidly evolving market opportunities.
Tags : verio, saas, software as service, managed services, website hosting, web site hosting, website hosting services, website hosting plans
     Verio
By: Verio     Published Date: Jul 06, 2011
This white paper explains how the Microsoft 2010 enables Solution Providers and VARs to better serve their clients.
Tags : hosted exchange 2010, hosted exchange, verio, saas, software as service, managed services, website hosting, web site hosting
     Verio
By: Citrix Systems     Published Date: Nov 10, 2014
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : mobile, web properties, applications, infrastructure, network devices, performance, communicate, security
     Citrix Systems
By: Citrix Systems     Published Date: Nov 10, 2014
Attend this webinar to learn how SDN helps address the challenges of virtualization. You will learn practical tips that can help you get started immediately. Agenda: • How virtualization impacts the underlying network infrastructure • Why and how SDN addresses the challenge of virtualization • How SDN enables “Just in Time” networks for L4-7 services
Tags : application, deployment, research, enterprise, data center, controller, network, security
     Citrix Systems
By: Citrix Systems     Published Date: Feb 10, 2016
"Is your mobile micro app concealing a complex web property? The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration. A micro app on a mobile device typically serves as the entry point to a web property. The combination of Citrix XenMobile and Citrix NetScaler offers enterprises an ideal solution that not only incorporates a comprehensive set of MDM and MAM features but also complements them with a market-leading, cloud-ready suite of capabilities for optimizing mobile web app performance, availability and security."
Tags : 
     Citrix Systems
By: Trend Micro Inc.     Published Date: Aug 23, 2011
Cybercriminals are constantly moving in with new methods of attack - here's how to stem the rising tide.
Tags : trend micro, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security, web threat management, medium business
     Trend Micro Inc.
By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download white paper now to learn the challenges of physical consolidation, performance issues for virtualization and cloud security requirements.
Tags : trend micro, cloud security, virtualization, internet content security, smart protection network, trend micro internet security, enterprise business security, worry-free business security
     Trend Micro Inc.
By: Trend Micro Inc.     Published Date: Aug 25, 2011
The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of choosing Trend Micro Enterprise Security for their complete content security protection.
Tags : trend micro, enterprise security, forrester, roi, total economic impactt, web security, vendor management savings, worry-free business security
     Trend Micro Inc.
By: Trend Micro Inc.     Published Date: Aug 25, 2011
Download the ESG white paper to help you identify: -Why virtualization should scare you -Security you didn't know existed -How to be confident in the cloud
Tags : trend micro, information security, virtualization, cloud, internet content security, smart protection network, trend micro internet security, enterprise business security
     Trend Micro Inc.
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper reviews the challenges with endpoint security in virtualized environments - including the inherent risks of dynamic virtual machines and the resource impact of security software such as virus-scanners in multiple guest virtual machines, on a single physical host.
Tags : trend micro, antivirus, virtual datacenter, enterprise security, virtual machines, virtualization, internet content security, smart protection network
     Trend Micro Inc.
By: Trend Micro Inc.     Published Date: Aug 25, 2011
This white paper describes the evolution of these changes as enterprises adopt virtualization and then cloud computing. It then describes Trend Micro's vision for the evolution of security as a facilitator of mobility, virtualization, and cloud computing.
Tags : trend micro, virtualization, cloud computing, security, internet content security, smart protection network, trend micro internet security, enterprise business security
     Trend Micro Inc.
By: LogMeIn     Published Date: Oct 08, 2015
This paper highlights emerging trends are transforming web collaboration.
Tags : web conferencing, customer service, web collaboration, technology, customer experience
     LogMeIn
By: IBM     Published Date: Apr 18, 2012
Join this webcast to learn how HealthCare specific Asset and Service Management functionality can improve uptime to support patient care and optimize procedure scheduling, control costs for procurement, maintenance, labor and materials, extend asset longevity, and Support regulatory compliance activities.
Tags : healthcare, cost, ibm, asset management, service management, technology
     IBM
By: IBM     Published Date: Apr 27, 2012
During this Webcast, Axendia Industry Analyst Daniel Matlis discusses with Mr. Lentz how The Johns Hopkins Hospital uses its Integrated Asset and Service Management solution to improve uptime to support patient care; control costs for procurement, maintenance, labor and materials; support regulatory compliance activities; and use workflow capabilities for internal controls.
Tags : healthcare, ibm, labor, maintenance, patient care
     IBM
By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
     Viavi Solutions
By: Symantec Corporation     Published Date: Aug 28, 2013
SSL certificates have moved beyond the ‘Buy’ page. They are embedded in your business. For example, they protect remote communications via webmail, chat and IM. Browser-to-server communications for cloud-based services require SSL certificates to protect confidential information. In addition, SSL certificates are used to secure server-to-server communications for applications and data exchange. In fact, SSL Certificates are a business-critical part of your IT infrastructure. However, managing individual certificates in a large organization is complicated by multiple locations, many servers, different business units, and rapidly growing Web-based services.
Tags : ssl certificates, communication, webmail, technical support, technology, data, security
     Symantec Corporation
By: Symantec Corporation     Published Date: Jun 18, 2014
Web-based systems are essential tools for running business processes and delivering services to customers. However, phishing and online fraud undermine customer confidence. In addition, Web security remains a top concern because of constantly evolving threats. Learn more about mitigating these web security risks with SSL Certificates in this IDC Technology Spotlight white paper
Tags : symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
     Symantec Corporation
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics