http

Results 26 - 50 of 75Sort Results By: Published Date | Title | Company Name
Published By: Workday     Published Date: Sep 14, 2018
"Looking for an agile and scalable ERP system but don’t know where to start? IDC MarketScape is a comprehensive guide specifically for midsize companies. Read an excerpt from the report to learn the capabilities your midsize company should expect from cloud-enabled ERP applications. https://www.workday.com/en-us/forms/reports/idc-me-landscape.dl.html "
Tags : 
    
Workday
Published By: VMware Citrix     Published Date: Jan 23, 2018
VMware Horizon and Workspace ONE is the most complete solution for delivering, managing, and protecting Windows desktops, applications, and online services across devices, locations, media, and connections. To learn more about how Workspace ONE delivers and manages any device by integrating identity, application, and enterprise mobility management: Visit http://www.vmware.com/products/horizon
Tags : 
vmware, horizon, workspace, delivering, managing, applications, desktop, online services
    
VMware Citrix
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Stay on top of the current trends in today's phishing schemes, the potential impact on companies, and insight into how you can apply technology to protect your business and customers.
Tags : 
extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: AWS     Published Date: Aug 01, 2018
Learn more about the AWS Partner Webinar Series at - https://amzn.to/2ILG0R7. Join our webinar to hear how Lyft and other data-driven organizations benefit from uncovering hidden insights in real time with AI solutions from Amazon Web Services (AWS) and Anodot. Learn how to prevent events that can impact your revenue and brand integrity with a solution that detects anomalies quickly, allowing you to address issues in a timely manner to help ensure a consistently high-quality experience for your customers.
Tags : 
    
AWS
Published By: Red Hat     Published Date: Jun 17, 2013
A recent Gartner research note discusses the strides DreamWorks Animation has made during its 13 years using open source technology. Red Hat has found that with cloud, virtualization, middleware, and operating system products and services, DreamWorks Animation has streamlined processes, improved techniques, and significantly reduced costs.
Tags : 
dreamworks, animation, production, red hat, technology, gartner, virtualization, cloud
    
Red Hat
Published By: Citrix Systems     Published Date: Jun 13, 2019
https://technews.onlinetechreports.com/Technews/Citrix-ProductivelyJAP.html
Tags : 
    
Citrix Systems
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
Get your guide today and discover a smart, new strategy for managing SSL security across your network. With VeriSign's Managed PKI for SSL Web-based service, you can centrally manage all of your SSL Certificates with a simple, Web-based interface.
Tags : 
mpki for ssl, managed security solutions, ssl, verisign, http protocol, secure sockets layer, public key infrastructure, certification-authority (root ca), server gated cryptography, sgc, certificate management, certificate-revocation list, crl
    
VeriSign Incorp.
Published By: Citrix Systems     Published Date: Jun 13, 2019
https://technews.onlinetechreports.com/Technews/Citrix-NetworkWinJAP.html
Tags : 
    
Citrix Systems
Published By: Sponsored by HP and Intel®     Published Date: May 10, 2013
Thanks to the emergence of cloud computing, it’s no longer possible for IT departments to be just a builder and manager of technology; you must also now be a broker of IT services across the enterprise. Consequently, you need to design an IT environment that offers the flexibility, efficiency, and security to meet these expectations and aligns services with business needs. This is a task that’s best achieved by striking a balance among IT domains, spanning traditional internal IT, private, and public cloud environments. But how do you achieve the right IT balance for delivering cloud services? Read this white paper to find out. To Learn about the HP Discover 2013 event in Las Vegas, click here: http://bit.ly/PTt3yD Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
Tags : 
it environment, cloud, all about service, it departments, it services
    
Sponsored by HP and Intel®
Published By: Viavi Solutions     Published Date: Jun 30, 2014
Look at the Graph, Find the Code and Boom – You’re Solving Problems. Identifying and understanding common HTTP status codes can go a long way in troubleshooting complex web application issues.
Tags : 
network instruments, http, troubleshooting, http status codes, web applications
    
Viavi Solutions
Published By: BMC Software     Published Date: Feb 12, 2014
IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS. Please enjoy a video preview of this white paper here: http://www.bmc.com/videos/solution-videos/hybrid-it-white-paper.html To learn more please download the white paper now!
Tags : 
itaas, saas, cloud, itsm, integrating itsm, itsm integration, itaas, saas integration, bmc
    
BMC Software
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices
    
Akamai Technologies
Published By: Network Automation     Published Date: Dec 10, 2008
The challenge of creating a robust errors database, the core of iCheck, is that information must be pulled from a multitude of disparate sources. Sometimes, the data source is a database with its unique schema and field names that must be mapped to the iCheck database. Other times, the data source is a text file which must be accessed via FTP, parsed, and loaded into iCheck. And other times, the data is in RETS (Real Estate Transaction Standard) format, a real estate data format similar to XML, which is accessed via HTTP.
Tags : 
network automation, data sources, data accuracy, database errors
    
Network Automation
Published By: Dell EMC     Published Date: May 29, 2019
Ulrike Rüger, Sales Director and Head of Business Unit Client Solutions bei Dell Deutschland, spricht über die Chancen der Digitalisierung für den deutschen Mittelstand und erklärt worauf es bei dem Weg in die digitale Zukunft ankommt. Unsere Lösungen für den Mittelstand finden Sie hier: https://www.dellemc.com/de/Mittelstand Windows 10 Pro ist genau das Richtige für Unternehmen
Tags : 
    
Dell EMC
Published By: VeriSign Incorp.     Published Date: Apr 15, 2009
A trust mark posted on the site tells online shoppers that a creditable third party, such as VeriSign, has found the site to be trustworthy.
Tags : 
verisign, internet trust marks, internet security, extended validation, green bar, online security, optimize, sgc, server gated cryptography, phishing, malware, ssl, verisign, consumer protection, internet security, spear-phishing, man-in-the-middle ssl stripping, encryption, https, certificate authority
    
VeriSign Incorp.
Published By: AWS     Published Date: Aug 06, 2018
Learn more about AWS Partner Webinars at - https://amzn.to/2I6ogPM. In this webinar, you will learn about VMware Cloud on AWS, an integrated hybrid cloud offering jointly developed by AWS and VMware delivering a highly scalable, secure and innovative service that enables organizations to seamlessly migrate and extend their on-premises VMware vSphere-based environments to AWS running on next-generation Amazon Elastic Compute Cloud (Amazon EC2) bare metal infrastructure.
Tags : 
    
AWS
Published By: Intralinks     Published Date: Nov 23, 2015
There are multiple options for organizations with intellectual property and restricted information that must be shared between staff and business partners to adopt in order to avoid inadvertent release of restricted information to unauthorized personnel.
Tags : 
kuppingercole, information sharing, security, data, intralinks
    
Intralinks
Published By: F5 Networks Inc     Published Date: Mar 23, 2015
A powerful but radically different version of the Web’s defining standard is coming soon and new research suggests many IT departments aren’t ready. While HTTP/2 enables dramatic improvements to both the speed and security of mission-critical Web applications, most companies are likely to find deploying it a complex and time-consuming task. An exclusive new survey from IDG Research reveals that large numbers of IT professionals know little about the new protocol or the technical challenges it can present and even fewer have a strategy in place for collecting HTTP/2’s considerable benefits without suffering its potential pitfalls.
Tags : 
http, web applications, mobile bandwidth, it security standards, mobile performance
    
F5 Networks Inc
Published By: Cisco     Published Date: Nov 17, 2015
Join us for Part 1 as senior executives from Cisco, Rockwell Automation, and Steelcase explore: - The business case for the Internet of Things (IoT) - Why IoT will change manufacturing as we know it - What you need to consider before your competition does Part 2: http://www.cisco.com/web/offers/iot-manufacturing-thankyou.html?KeyCode=%257bTreatment%20Code%257d&source_page=none&islp=nlp
Tags : 
internet of things, iot, automation, cisco, manufacturing management, business intelligence, manufacturing operations, business integration, cisco
    
Cisco
Published By: Citrix Systems     Published Date: Jun 13, 2019
https://technews.onlinetechreports.com/Technews/Citrix-Office365JAP.html
Tags : 
    
Citrix Systems
Published By: NexGen     Published Date: Feb 09, 2015
Looking for the right Flash Array for you? Tired of all data being treated the same but want to save time and budget? Flash storage is helping to address the latency inherent with disk drives, enabling you to virtualize more, and reduce application response times. It's an inescapable fact that the $/GB of flash is much higher than disk drives. So why do the majority of storage vendors indiscriminately accelerate all data, regardless of its value to your business? All-flash arrays waste money by storing non-critical data in flash, and hybrid arrays can't control whether mission-critical or non-critical data accesses flash, leading to unpredictable performance. So what do you do to find a solution that addresses both of these issues? Download now and see NexGen's approach to value-driven data management. Make it simple to control what data is stored in flash and affordably tailor application performance to match your organizations priorities now! - See more at: http://www.findwhitep
Tags : 
nexgen, hybrid, flash, cisco, nexus, vmware, software development
    
NexGen
Published By: Aria Systems     Published Date: Nov 02, 2015
The case for recurring revenue models has grown so strong as to be irrefutable, but putting these ideas to work for your business requires infrastructure, a plan, and proficient implementation. This Guide to Recurring Revenue Success was written by industry expert Bob Harden to inform you about the opportunity for recurring revenue, what’s necessary to succeed, and how to get started. You'll learn: • Why the recurring revenue model is spreading so rapidly • How to get started on developing a recurring revenue strategy • Which elements are essential for successful implementation • What lies ahead for companies which adopt recurring revenue models - See more at: http://info.ariasystems.com/recurring-revenue-success-guide.html#sthash.W65wlfVw.dpuf
Tags : 
aria systems, revenue models, recurring revenue success, bob harden
    
Aria Systems
Published By: Citrix Systems     Published Date: Jun 26, 2019
https://technews.onlinetechreports.com/Technews/Citrix-OptimazingJAP.html
Tags : 
    
Citrix Systems
Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing
    
Secure Computing
Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
The vulnerability of Wi-Fi and conventional wired Ethernet networks is nothing new. But the new Firesheep Wi-Fi attack tool has opened the vulnerability up to others, putting sensitive information within the easy reach of even casual hackers. Learn what you need to do to protect your company from these attacks.
Tags : 
verisign, symantec, ssl, firesheep, sidejacking attacks, wifi, http connections, https, tls/ssl, vulnerability management, sensitive information, hackers
    
VeriSign, Inc.
Start   Previous    1 2 3    Next    End
Search Resource Library