RSS feed Get our RSS feed

News by Topic

web applications

Results 176 - 200 of 358Sort Results By: Published Date | Title | Company Name
By: Ensighten     Published Date: Aug 02, 2012
Watch the playback on the hidden costs of website Javascript tagging in time, resources, page speed and stability. Hear the benefits of tag management systems and what to look for, plus hear how Sony increased web analytics ROI, while speeding page load.
Tags : tag management, digital marketing, web marketing, web analytics, digital advertising, online advertising, javascript tags, web page optimization
     Ensighten
By: Red Hat, Inc.     Published Date: Jul 10, 2012
Is data changing the way you do business?Is it inventory sitting in your warehouse? The good news is data-driven applications enhance online customer experiences, leading to higher customer satisfaction and retention, and increased purchasing.
Tags : it planning, data, data-driven applications, data challenges, data solutions, big data solutions, big data challenges, in-memory databases
     Red Hat, Inc.
By: Arcserve     Published Date: Jul 26, 2010
Using the CA Wily Application Performance Management (APM) solution consisting of CA Wily Introscope® and CA Wily Customer Experience Manager™, JN Data better manages Web applications through faster diagnosis of problem root causes in its customers' heterogeneous environments.
Tags : ca technologies, jn data, web application management, ca wily, application performance management, apm, customer experience manager, virtual server network
     Arcserve
By: Qualys     Published Date: Nov 05, 2013
Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.
Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability
     Qualys
By: F5 Networks Inc     Published Date: Jul 27, 2015
Today, enterprises are extending their businesses by using more web-based and cloud-hosted applications, so a robust and agile web application firewall (WAF) isn't a luxury--it is a requirement. This whitepaper breaksdown some of the key factors you should consider when selecting a WAF to protect your business.
Tags : web application firewall, waf, cloud-hosted applications, it solutions, it security, web-based applications, security
     F5 Networks Inc
By: BMC Control M     Published Date: Jul 16, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : workload, automation, smart, bmc, wla, ema, itil, soa
     BMC Control M
By: BMC Control M     Published Date: Jul 22, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : workload, automation, smart, bmc, wla, ema, itil, soa
     BMC Control M
By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how to deliver lean business process management (BPM) via collaborative process-centric web applications inexpensively and quickly.You can develop applications in days rather than months, deploy in minutes and get a quick return on that precious IT investment. Define processes easily, and get them online quickly. Mashup technology for lean BPM makes it simple to build collaborative process-centric applications, without coding.
Tags : collaborative, process-centric applications, serena software, serena, bpm, business process management, it investment, business mashups
     SERENA Software, Inc
By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how to deliver lean business process management (BPM) via collaborative process-centric web applications inexpensively and quickly.  You can develop applications in days rather than months, deploy in minutes and get a quick return on that precious IT investment. Define processes easily, and get them online quickly. Mashup technology for lean BPM makes it simple to build collaborative process-centric applications, without coding.
Tags : collaborative, process-centric applications, serena software, serena, bpm, business process management, it investment, business mashups
     SERENA Software, Inc
By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications
     Microsoft
By: MuleSoft     Published Date: Jul 13, 2018
"IT teams across industries face growing pressure to deliver projects faster while reducing costs. All too often, dated legacy systems hinder IT’s ability to accomplish either of these objectives. Legacy systems can also slow the speed at which IT can deliver new projects to support the business. For these reasons, legacy modernization has emerged as a key strategic imperative. But where should organizations start? One large global bank provides a detailed blueprint for how large enterprises can do so. Read this legacy modernization blueprint to learn: -Best practices for modernizing legacy SOA web services -How to think about re-architecting monolithic applications into microservices -The role that APIs play in driving an effective legacy modernization strategy -The bank’s legacy modernization strategy, and how they used Anypoint Platform"
Tags : 
     MuleSoft
By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection
     Cenzic
By: Cenzic     Published Date: Nov 29, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  The solution is automated security assessment products that leverage stateful processing to comprehensively examine web applications and reveal vulnerabilities in hours rather than weeks.  Find out how Cenzic's ClickToSecure solution can help you secure your applications.
Tags : compiance, internet application security, it spending, application security, vulnerability management, identity management, security assessment, security audit
     Cenzic
By: Twilio     Published Date: Aug 21, 2012
Twilio is a cloud communications platform that lets you use standard web languages to build voice, VoIP and SMS applications via a simple web API. Build intelligent communication solutions in the cloud.
Tags : twilio, csc, common short codes, short code marketing, sms marketing
     Twilio
By: Akamai Technologies     Published Date: Dec 07, 2016
Leveraging Technology to Improve Customer Engagement — A Guide for Financial Services Institutions
Tags : online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions
     Akamai Technologies
By: Shape Security     Published Date: Sep 16, 2019
More than 50% of all e-commerce fraud losses are from cyberattacks such as account takeover, gift card cracking and inventory scalping. While these attacks occur year round, the majority of losses are sustained during peak seasonal promotions and new product releases. Watch this briefing to learn the anatomy of the costliest attacks on web and mobile applications, and insights from Top 10 Retailers on successful mitigation techniques. Topics covered include: Top 3 retail attack techniques Analysis of attack data during sales promotions Best practices from Top 10 Retailers
Tags : 
     Shape Security
By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
     KEMP Technologies
By: IBM     Published Date: Aug 10, 2009
This webinar discusses IBM Lotus’ venture in the Software-as-a-Service (Saas) market through LotusLive. LotusLive is an integrated collaborative and social networking services connected to relevant business services and applications.
Tags : webinar, lotus, lotuslive, ibm, saas, software-as-a-service, social networking, integrated collaborative
     IBM
By: IBM     Published Date: Jan 12, 2009
To remain competitive, today’s businesses need to meet high expectations for rich, interactive browser experiences. IBM WebSphere Portal offers extensive support for Web 2.0, and can enable your organization to easily deploy high performing, intuitive applications. Watch this demo to learn about the Web 2.0 features available today with IBM.
Tags : ibm, websphere portal, web 2.0, interactive browser experience, intuitive applications
     IBM
By: Group M_IBM Q3'19     Published Date: Aug 29, 2019
Which of your applications should move to the cloud? Is public, private, or hybrid cloud the right choice? And should you use containers, or Platform-as-a-Service technologies? Whether you’re trying to optimize your existing landscape, strengthen your foundation, or innovate with newer technologies that are delivered via cloud platforms, you need to know where to start. In this webcast, hear how IBM helped The Tribune Publishing Company build an effective plan to accelerate their digital transformation. Learn how IBM can also help you analyze your full portfolio, identify opportunities to optimize and automate your infrastructure and determine which applications to move, and the potential business value.
Tags : 
     Group M_IBM Q3'19
By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
     Akamai Technologies
By: F5 Networks Inc     Published Date: Mar 23, 2015
A powerful but radically different version of the Web’s defining standard is coming soon and new research suggests many IT departments aren’t ready. While HTTP/2 enables dramatic improvements to both the speed and security of mission-critical Web applications, most companies are likely to find deploying it a complex and time-consuming task. An exclusive new survey from IDG Research reveals that large numbers of IT professionals know little about the new protocol or the technical challenges it can present and even fewer have a strategy in place for collecting HTTP/2’s considerable benefits without suffering its potential pitfalls.
Tags : http, web applications, mobile bandwidth, it security standards, mobile performance, security
     F5 Networks Inc
By: IBM     Published Date: Aug 21, 2013
Have you ever found yourself in this untenable position? Your web team and email program owners are targeting the same customers, with different offers, or worse, competing offers. Siloed systems and teams limit marketers’ ability to make sound assessments about performance and spending. Marketers around the world spend over one trillion USD each year. Yet, most of them still manage their marketing programs with a hodgepodge of spreadsheets and disconnected applications. Unnecessary costs, delays and poor collaboration plague marketers. Under increasing pressure to connect with customers while doing more with less, marketers who strive to optimize marketing performance through a single integrated software platform can make the best use of people, programs and resources. Today, you need a return on every dollar spent and a platform that aligns technology, people and processes to help create effective, efficient marketing programs that support customers for life.
Tags : enterprise marketing management, marketing management, marketing roi, marketing connections, marketing performance, return on investment, marketing optimization
     IBM
By: Sun Microsystems     Published Date: Feb 24, 2009
Storage costs are exploding. The culprits, according to this white paper: new Web-based applications that demand more I/O throughput and higher performance than ever. So how can you handle this onslaught while keeping your cost per GB (and cost per user) reasonable?
Tags : sun, web infrastructure, storage, storage costs, tco, complexity, sun storage, open storage
     Sun Microsystems
By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
     Avi Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics