applications

Results 351 - 375 of 4122Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Nov 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan. In viewing this Akamai content, we would like to share your data with Akamai. Click here for more info or to opt out.
Tags : 
    
Akamai Technologies
Published By: 3D Systems     Published Date: Feb 28, 2019
L'impression 3D s'est imposée comme technologie de prototypage dans les années 80 et a rapidement évolué depuis. Les développements continus des dernières décennies ont transformé l’impression 3D (également appelée fabrication additive) en technologie durable et économique dans tout l’environnement de production : du prototypage à l'intégration à la production, jusqu'à la production 3D directe. Les entreprises qui utilisent l’impression 3D peuvent devenir des leaders de leur secteur et conforter leur position grâce aux progrès réalisés avec l'impression 3D en matière de délais, de coûts et de capacité. Cet ebook contient une présentation générale des avancées réalisées dans la technologie d’impression 3D et les matériaux de fabrication additive en plastique de 3D Systems, qui étendent l'éventail des applications de production possibles.
Tags : 
    
3D Systems
Published By: Venafi     Published Date: Aug 10, 2015
This paper demonstrates a recent attack that used cryptographic keys and digital certificates as well as guidance on how to protect certificates and keys and quickly discover and remediate breaches.
Tags : 
attacks, cyberattacks, protect certificates, how to remediate breaches, security, security applications
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
The need for authentication and assurance is great and options are few; therefore, we have come to rely on encrypted SSL/TLS certificates for almost every new application, appliance, device and cloud service.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network
    
Venafi
Published By: Venafi     Published Date: Oct 26, 2015
This is the second part of the Ponemon Institute’s 2015 Cost of Failed Trust Report, which reveals the damaging impacts on global business from unprotected cryptographic keys and digital certificates. This new report reveals that most companies lose customers, suffer costly outages, fail audits, and experience breaches due to unprotected and poorly managed keys and certificates.
Tags : 
security controls, security, security applications, ssl/tls certificates, secure connection, security network
    
Venafi
Published By: IFS     Published Date: Jun 25, 2014
Find out how ERP can help EPC contractors, equipment fabricators and service providers meet new demands from oil/gas companies.
Tags : 
ifs, erp, oil contractors, gas contractors, soa, enterprise applications
    
IFS
Published By: IFS     Published Date: Jun 25, 2014
More and more companies are developing an interest in global ERP, and are confronting daunting barriers to getting to their goal of a single global ERP instance. Learn how to achieve the cost savings and simplicity that come from operating business units on a single database, on a single instance of ERP.
Tags : 
ifs, erp, soa, enterprise applications
    
IFS
Published By: IFS     Published Date: Jun 25, 2014
EAM software delivers key benefits to an organization that relies on expensive and complex assets. It gives senior management visibility and control over the drivers of cost and productivity of those assets. And it offers real maintenance management and risk management benefits. Learn the 5 steps to realizing EAM software benefits today!
Tags : 
ifs, eam software, enterprise applications, mrp, cmms
    
IFS
Published By: EMC Corporation     Published Date: Dec 19, 2014
IT infrastructure is the backbone of today's modern business. Find out how Vblock System implementations sped deployments, simplified operations, improved business-support agility, saved money, and freed staff to launch new applications, extend services, and improve user/customer satisfaction.
Tags : 
it infrastructure, deployments, simplified operations, user/customer satisfaction
    
EMC Corporation
Published By: Infor     Published Date: Jan 03, 2011
The company's ultimate goal was to enhance the interaction among its CRM applications and maximize the value of each incoming call to create more personalized and profitable interactions with customers.
Tags : 
infor, bell cananda, crm application, interaction, customer service representatives, database
    
Infor
Published By: Infor     Published Date: Jan 06, 2011
The company's ultimate goal was to enhance the interaction among its CRM applications and maximize the value of each incoming call to create more personalized and profitable interactions with customers.
Tags : 
infor, bell cananda, crm application, interaction, customer service representatives, database
    
Infor
Published By: Emerson Network Power     Published Date: Mar 09, 2011
This brochure will help to depict the various solutions' applications in the arena of Power Management ,Virtualization, Data Center Automation and Cloud Computing.
Tags : 
emerson network power, quick start, power management, virtualization, data center automation, cloud computing
    
Emerson Network Power
Published By: EMC     Published Date: Apr 15, 2011
Why should you deploy Microsoft applications with VMware vSphere Essentials on EMC's new VNXe? We have 10 good reasons and you can read them all in this information handout.
Tags : 
emc vnx, virtualized microsoft applications, vmware vsphere essentials, storage system, vnxe, replication manager
    
EMC
Published By: Red Hat Government     Published Date: Jul 21, 2011
An IDC executive report examines the future of cloud computing, focusing on design goals that support portability of applications and data, which will certainly avoid expensive and time-consuming fixes.
Tags : 
cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Do you have an effective cloud governance plan? This whitepaper guides you through best practices for ensuring your applications and data can safely move between clouds - whether they are private, public or hybrid.
Tags : 
cloud governance, governance, consistency, portability, consistant, portable, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Red Hat Government     Published Date: Jul 21, 2011
Organizations around the world are benefiting from public clouds. But, when production applications or critical data is involved, it's important to extend on-premise governance to your public or hybrid cloud resources. Effective cloud governance is possible.
Tags : 
cloud governance, governance, cloud computing, interoperability, red hat, open source, idc, enterprise linux, enterprise solutions, virtualization, linux, unix, redhat, government
    
Red Hat Government
Published By: Adobe     Published Date: Sep 26, 2013
Enterprises strive for ever-greater business impact from their online presence, demanding more from Web content management than it has traditionally delivered. In this Gartner report, you'll find how well WCM vendors are responding, providing insights for buyers and those reviewing their existing applications.
Tags : 
web content management, buyer insights
    
Adobe
Published By: Adobe     Published Date: Nov 07, 2013
Marketers’ social media successes have added to their burdens. Many now have dozens of social pages to manage, thousands of customer comments to monitor, and hundreds of colleagues who want (or need) to participate. Social relationship platform vendors off er tools that help marketers efficiently and responsibly expand their social capabilities.
Tags : 
adobe, forrester social wave, social relationship platform, srp, significant vendors, branded social presence, social relationship, platform evaluation, srp space, undifferentiated players, interactive marketing, managing social presence, customer engagement, marketing tactics, manage large deployments, managing workflow, marketing content, social applications, customer feedback
    
Adobe
Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring, network monitoring, infrastructure performance monitoring, infrastructure monitoring, business transaction management, end-user experience monitoring, end-user monitoring, real-user monitoring, operations analytics, cloud performance monitoring, web performance monitoring, database performance monitoring, citrix performance monitoring
    
ExtraHop
Published By: Red Hat     Published Date: Jan 01, 2013
IDC profiles a range of customers successfully employing Red Hat Enterprise Linux for a full spectrum of workload types, including high-end applications previously hosted on non-x86 servers.
Tags : 
linux, business-critical workloads, workload data, ecosystem, application software, development, deployment software, infrastructure software
    
Red Hat
Published By: Red Hat     Published Date: Jan 01, 2013
Under pressure to improve service levels and contain costs, many enterprises are adopting a dual operating system (OS) approach. They are choosing Windows for office productivity and collaboration applications and Red Hat Enterprise Linux for infrastructure and datacenter modernization. Red Hat Enterprise Linux easily integrates with existing Windows infrastructure, making dual deployment possible.
Tags : 
dual platform, modern datacenter, productivity, collaboration, linux, deployment
    
Red Hat
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search Resource Library