Skip to main content
 

web technologies

Results 51 - 75 of 101Sort Results By: Published Date | Title | Company Name
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Watch this informative webcast as we discuss how the integrated intelligence in Microsoft Dynamics GP and other Microsoft technologies can help improve your company operations by providing business insights to all employees. Learn how you can enable people throughout your organization to make confident, business-critical decisions while minimizing costs.
Tags : 
business management, decision making, analytics, analytical, reporting, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
Progress Actional is the leader in delivering management products and solutions for today's interconnected applications - including service-oriented architecture (SOA). Learn more about SOA and Web service management technologies by reading through our broad selection of white papers, on-demand webinars, podcasts and other helpful learning resources.
Tags : 
progress, actional, soa, management, interconnected application, application management
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
Progress Actional is the leader in delivering management products and solutions for today's interconnected applications - including service-oriented architecture (SOA). Learn more about SOA and Web service management technologies by reading through our broad selection of white papers, on-demand webinars, podcasts and other helpful learning resources.
Tags : 
progress, actional, soa, management, interconnected application, application management
    
Progress Software BTA Telecommunications
Published By: Epicor     Published Date: Feb 22, 2010
This white paper details how Web 2.0 technologies support business strategies by improving efficiency, productivity, and collaboration.
Tags : 
epicor, web 2.0, enterprise applications, productivity, business application, it management, integration, soa
    
Epicor
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Plantronics     Published Date: Oct 18, 2013
As communication options and needs increase, clear preferences have emerged regarding the best ways to exchange specific types of information.
Tags : 
plantronics, global workforces, anywhere-anytime attitude, brainstorming, collaborating, communications tool belt, phone conferences, audio conferences, web conferences, video conferences, social media, communication technologies, team strategies, office environment, gaining consensus, critical information, technology innovations
    
Plantronics
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity
    
ThreatTrack Security
Published By: Amazon Web Services     Published Date: Apr 27, 2018
Until recently, businesses that were seeking information about their customers, products, or applications, in real time, were challenged to do so. Streaming data, such as website clickstreams, application logs, and IoT device telemetry, could be ingested but not analyzed in real time for any kind of immediate action. For years, analytics were understood to be a snapshot of the past, but never a window into the present. Reports could show us yesterday’s sales figures, but not what customers are buying right now. Then, along came the cloud. With the emergence of cloud computing, and new technologies leveraging its inherent scalability and agility, streaming data can now be processed in memory, and more significantly, analyzed as it arrives, in real time. Millions to hundreds of millions of events (such as video streams or application alerts) can be collected and analyzed per hour to deliver insights that can be acted upon in an instant. From financial services to manufacturing, this rev
Tags : 
    
Amazon Web Services
Published By: IBM     Published Date: Oct 01, 2013
Engaging Your Employees & Improving Adoption and Retention of Key Business Messages Today's Corporate Communications leaders are tasked with making their employees smarter about your company's business, elevating their engagement and knowledge around your brand in ways that are impactful, memorable and enables retention of the key messages. Yet in a recent CMO Study conducted by IBM Institute For Business Value, only 20% of CMO's believe that the corporate character and brand are fully understood by the organizations employees. Join us for a 60-minute webinar to discover how how other companies are successfully creating advocates out of their employees and help them to better understand their corporation's key messages through the use of new and exciting technologies.
Tags : 
corporate communications, social business, employee learning, employee retention, human resource management, cmo, workforce management, smarter workforce, corporate branding, technology, social media
    
IBM
Published By: QuinStreet     Published Date: Feb 05, 2009
This white paper details how Web 2.0 technologies support business strategies by improving efficiency and productivity as well as harnessing knowledge through collaboration. They also reduce IT costs by simplifying integration and improving IT administration and maintenance.
Tags : 
quinstreet, web 2.0, social computing technologies, erp applications, enterprise applications, technology applications
    
QuinStreet
Published By: Trend Micro, Inc.     Published Date: Nov 12, 2009
Securing the Physical, Virtual, Cloud Continuum Virtualization and cloud computing are radically altering data center operations. In this webinar, Ted Ritter, Senior Research Analyst at Nemertes Research, and Harish Agastya, Director of Product Marketing at Trend Micro, discuss the rise of virtualization and cloud computing and the impact this is having on security best practices and next-generation security technologies.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security
    
Trend Micro, Inc.
Published By: Arkadin     Published Date: Sep 11, 2013
Financial services institutions focus on innovative services, customer relationships, and cost structures to drive profitable growth. Remote collaboration solutions (audio and web conferencing) are technologies target these three areas by transforming business processes.
Tags : 
financial services, finance, fsi, financial service institutions, regulatory compliance, banking and financial services, financial solutions, capital markets, collaboration, collaboration solutions, arkadin, web collaboration solutions, web collaboration services, conferencing solutions, conferencing services, audio web conferencing
    
Arkadin
Published By: TIBCO     Published Date: May 15, 2013
According to Forrester, most organizations today are only using 12% of their available data and only 37% of organizations are planning some type of big data technology project. At a time when companies are seeing volume of information increase quickly, it’s time to take a step back and look at the impact of big data. Join Mike Gualtieri, Principal Analyst at Forrester, for this webcast exploring the importance of integration in your big data initiatives. Discover how your ability to operate, make decisions, reduce risks and serve customers is inextricably linked to how well you’re able to handle your big data. Continue on to gain insight into: •3 key big data management activities you need to consider •Technologies you need to create for your big data ecosystem •A multi-dimensional view of the customer is the holy grail of individualization •Overcoming key integration challenges And more!
Tags : 
big data, integration, architecture, database, data warehousing, operations management
    
TIBCO
Published By: IBM     Published Date: Jun 13, 2016
Analyst Zach Lahey from Aberdeen group will share research insights in this webinar and will explore how to evaluate your internal and external talent acquisition processes to determine what’s working and what’s not. In addition, we will delve into the technologies that are available to make talent acquisition more effective than ever. After attending this webinar, you will be able to answer these three questions about your current process: What is your recruiter’s experience like? What are their trials, tribulations, and daily interactions? What is your candidate’s experience like? Where do they struggle, how much effort does it take for them to find information and apply for jobs? Finally, if either one (or both) doesn’t meet your expectations, what are you going to do about it and when?
Tags : 
aberdeen, ibm, ibm smarter workforce, talent acquisition
    
IBM
Published By: SnowFlake     Published Date: Jul 08, 2016
Today’s data, and how that data is used, have changed dramatically in the past few years. Data now comes from everywhere—not just enterprise applications, but also websites, log files, social media, sensors, web services, and more. Organizations want to make that data available to all of their analysts as quickly as possible, not limit access to only a few highly-skilled data scientists. However, these efforts are quickly frustrated by the limitations of current data warehouse technologies. These systems simply were not built to handle the diversity of today’s data and analytics. They are based on decades-old architectures designed for a different world, a world where data was limited, users of data were few, and all processing was done in on-premises data centers.
Tags : 
snowflake, data, technology, enterprise, application, best practices, social media
    
SnowFlake
Published By: Flimp Media     Published Date: Feb 02, 2010
This report, which describes the emerging web video direct marketing category, discusses how online video marketing isn't just for advertisers anymore; explains the applications and benefits of interactive web video and in particular video landing pages for direct marketing, communications and sales; and explores how new technologies are enabling users to create, distribute and measure effective email video marketing campaigns without programming or advanced technical skills.
Tags : 
flimp, b2b, idc, intelligent digital collateral, digital sales, direct marketing, analytics, rich media, social media, online video
    
Flimp Media
Published By: TRUSTe     Published Date: Dec 08, 2010
This paper outlines for businesses the mobile landscape and introduces best design and privacy practices for mobile websites and apps, location-aware technologies, and mobile advertising.
Tags : 
truste, mobile platform strategy, design, privacy and security, mobile advertising, website, apps
    
TRUSTe
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server
    
IBM
Published By: Akamai     Published Date: Apr 10, 2015
Enterprise network architectures are evolving as a result of the growth of public cloud, proliferation of mobile devices, and organizational requirement to collaborate with global users. In this on-demand webinar, Gartner Research VP and Distinguished Analyst Mark Fabbi and Akamai Technologies' Enterprise Web Experience Product Manager, Greg Lord, will provide insight into this new trend.
Tags : 
akamai, web performance, cloud services, network management, cloud networking, digital enterprise
    
Akamai
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution
    
Cisco
Published By: Sun Microsystems     Published Date: Jul 20, 2009
This free white paper from the experts at IDC reveals the profound impact of social technologies-also known as Web 2.0-on enterprise IT. Users are demanding capabilities including collaboratively working across regions, knowledge capture, and community and brand building outside the firewall. But you can meet those demands-if you're ready.
Tags : 
web 2.0, sun, social technologies, enterprise it, collaboration, virtualization, sun microsystems, power, cooling
    
Sun Microsystems
Published By: HP and Intel ®     Published Date: May 27, 2014
This on-demand webcast sponsored by HP and Intel® contains insights from both Forrester and HP into converged infrastructure. Ever increasing pressures for agility and innovation can be overwhelming for enterprise businesses. HP's Helen Tang and Forrester's Dave Bartoletti explain how converged infrastructure can become the "next big thing" in providing organizations the ability to adjust to ever changing technologies.
Tags : 
intel, converged infrastructure, mobile users, applications, virtualization, enterprises
    
HP and Intel ®
Published By: MapR Technologies     Published Date: Jan 08, 2014
Forrester Research shares seven architectural qualities for evaluating Big Data production platforms. In this webinar guest speaker Mike Gualtieri, Principal Analyst at Forrester, along with experts from MapR and Cisco, will present the following: • The 7 architectural qualities for productionizing Hadoop successfully • Architectural best practices for Big Data applications • The benefits of planning for scale • How Cisco IT is using best practices for their Big Data applications Speakers • Mike Gualtieri, Principal Analyst at Forrester Research • Jack Norris, Chief Marketing Officer at MapR Technologies • Andrew Blaisdell, Product Marketing Manager at Cisco • Sudharshan Seerapu, IT Engineer at Cisco
Tags : 
big data, big data analytics, hadoop, apache hadoop, structured data, unstructured data, business analytics, metadata, analytics, mapreduce, data, data center, mapr
    
MapR Technologies
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics
    
Cisco
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.