Skip to main content
 

web technologies

Results 51 - 75 of 123Sort Results By: Published Date | Title | Company Name
Published By: CA Service Assurance     Published Date: May 23, 2011
IDG Research Services recently conducted a study via the CIO Forum on LinkedIn. The results found that CIOs and IT leaders recognize the business impact of web application performance. It's all about the end user: ensuring customer satisfaction, increasing employee productivity, and lowering IT costs.
Tags : 
web application performance, cio, end user, idg research services, linkedin, it leaders, ca technologies, customer satisfaction, employee productivity, it cost
    
CA Service Assurance
Published By: Citrix     Published Date: Nov 04, 2015
More and more, your customers are connecting to your products and services on their mobile devices. So if your goal is to provide great customer service, that’s where you need to be: in the app, interacting with customers. Join this webinar to hear industry experts discuss how in-app support will be the next era of customer service. Emerging mobile technologies are posing new challenges and opportunities — are you and your support team prepared? Attend this live webinar to learn: • Ways to evaluate your support center for the mobile world • How new technologies will impact the customer service industry • Why your customer service should offer in-app support options • And more…
Tags : 
    
Citrix
Published By: 8x8 Inc.     Published Date: Aug 09, 2017
Progressive companies of all sizes today are taking advantage of new, web-based technologies to reduce IT complexity and increase their competitiveness. Mobile apps and devices that provide anywhere, anytime connectivity and cloud infrastructure that enables seamless, scalable growth give them the speed and flexibility to grow quickly and expand into new markets. In this whitepaper you will find three examples of forward-thinking franchise owners and entrepreneurs that are growing their businesses and positioning themselves for the future with unified communications solutions. These franchises are: McDonald's RE/MAX Fix Auto Download now to learn more!
Tags : 
franchise, mcdonald's, mobile app, positioning, communication solutions, 8x8
    
8x8 Inc.
Published By: VMware     Published Date: Dec 05, 2017
"Are you planning a migration off Citrix XenApp or XenDesktop? Or looking for ways to make them run as good as you thought they should? Then this is the session for you. Come hear from the architect of VMware's Citrix migration and enhancement strategies as he explains how key VMware technologies such as Horizon, App Volumes, Instant Clone and NSX can help. We will dive deep on how to evaluate the state of the Citrix environment, assess project requirements and review real world scenarios. By the end of the session you will know all about the best-practices, tools and services available to ensure your project is a complete success. Download the webinar to learn how VMware technologies can help solve your Citrix problems!"
Tags : 
vmware, citrix, app volumes
    
VMware
Published By: OKTA     Published Date: Sep 26, 2017
Traditional web applications pre-date modern standards like SAML and OpenIDConnect, so they often use legacy authentication methods to grant end users access. Historically, providing Single Sign-On and centralized access management for end users across these legacy applications required a Web Access Management, or WAM, product. These on-premises software tools could be expensive to maintain and complex to deploy. Now, modern identity providers like Okta in conjunction with best-of-breed network management technologies offer a better way. This white paper describes how web applications that lack modern standard support can be integrated into a cloud-based Identity-as-a-service architecture.
Tags : 
    
OKTA
Published By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 04, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: F5 Networks Inc     Published Date: Jul 21, 2014
Most organizations are concerned with the speed of their applications. Whether it involves an internal business application or a customer-facing shopping site, web application performance can have a huge impact on business performance. A faster-performing web application results in greater sales, better user engagement and improved productivity. The aim of accelerating these web applications is to improve the end-user experience with faster page-load times and more responsive interactivity. Read this article to learn more about the essential principles driving web application acceleration technologies today.
Tags : 
web app, acceleration, implementation, data, performance
    
F5 Networks Inc
Published By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : 
verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale, pos, application-layer vulnerabilities, web 2.0, virtual servers, service oriented architecture (soa), lightweight technologies, insider threat, holistic control model, software development lifecycle, sdlc, wafs
    
VeriSign Incorp.
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
The demand for (and benefits of) web-based interfaces combined with an increasingly mobile and distributed workforce has exposed inefficiencies inherent in the browser, the network and its protocols, and the data center. These inefficiencies create performance problems for applications that continue to be magnified by emerging technologies like Web 2.0 and SOA. This White Paper details how F5's approach to Application Delivery Networking eliminates the bottlenecks inherent in browsers, in the network, and in the data.
Tags : 
web acceleration 2.0., web-based interfaces, data center, soa, service-oriented architecture, application delivery networking
    
F5 Networks Inc
Published By: Innotas     Published Date: Nov 22, 2010
A Roadmap To Driving Top-Down Alignment Between Business & IT Strategy.
Tags : 
innotas, cxo's guide, it governance, web 2.0 technologies, automation solution, network, it governance, enterprise services, it management, strategy, accountability, cost saving, business intelligence
    
Innotas
Published By: IBM US Smarter Buildings     Published Date: Jan 10, 2012
View this on-demand webcast to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, sustainability goals, environmental
    
IBM US Smarter Buildings
Published By: IBM US Smarter Buildings     Published Date: Apr 23, 2012
View this on-demand webcast to learn the practical strategies, targeted initiatives and deployed technologies used by organizations that have "crossed the sustainability chasm", using findings from a wide-ranging survey of 130 sustainability-focused professionals.
Tags : 
ibm, smarter buildings, eam, asset management, workplace solutions
    
IBM US Smarter Buildings
Published By: Oracle Hospitality - S&E     Published Date: May 09, 2017
Web and mobile technologies are changing the way people live. The good news for the sports and entertainment industry is that web and mobile technologies can help you engage with your customers like never before. That engagement leads to greater loyalty and improved revenues and profitability for your business. Oracle Hospitality provides technology to some of the world’s most successful stadiums and arenas. This paper shares 20 ideas for how your venue can leverage web and mobile technologies today and into the future.
Tags : 
    
Oracle Hospitality - S&E
Published By: Epson     Published Date: May 14, 2018
Consumers worldwide continue to adopt and use technology in their shopping experience. Faced with rising customer expectations and increasing competitive pressures, retailers now are prioritizing in-store innovation. Many retailers have adopted multichannel implementations, in which mobile, web, and in-store shopping are enabled but not delivered consistently to the customer. The next step in this evolution is an omnichannel strategy, now being deployed by some retailers, which presents a consistent shopping experience across mobile, web, and in-store channels. Omnichannel also enables retailers to integrate back-end infrastructure technologies (e.g., servers, databases, etc.) and cloud-based services (e.g., loyalty programs, personalized recommendations, inventory management, etc.) to improve many aspects of store and enterprise operations. An omnichannel strategy relies on several core and supporting technologies. The key factors in evaluating any omnichannel-enabling solution includ
Tags : 
    
Epson
Published By: SDL Web Content Management Solutions     Published Date: Jan 22, 2010
This white paper provides examples of how organizations can use BluePrinting technology to achieve a smooth, global Web operation-and explains how organizations can combine Content Management technology with translation technologies for even greater efficiency.
Tags : 
sdl tridion, a/b, crm, ecm, blueprinting, flysn, wcm, dam, websites, translation
    
SDL Web Content Management Solutions
Published By: Dell Windows Server     Published Date: Jan 16, 2009
New virtualization tools, Web technologies, and security enhancements help save time and reduce costs, and provide you with high availability and increased flexibility for your changing business needs. Central to IT simplification is streamlining maintenance and maximizing availability — and by running Windows Server 2008 on Dell servers, you can do both.
Tags : 
dell, ws08, new virtualization, web technologies, security enhancements, windows server 2008
    
Dell Windows Server
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Watch this informative webcast as we discuss how the integrated intelligence in Microsoft Dynamics GP and other Microsoft technologies can help improve your company operations by providing business insights to all employees. Learn how you can enable people throughout your organization to make confident, business-critical decisions while minimizing costs.
Tags : 
business management, decision making, analytics, analytical, reporting, microsoft, microsoft dynamics
    
Microsoft Dynamics
Published By: Progress Software BTA Financial     Published Date: Oct 26, 2009
Progress Actional is the leader in delivering management products and solutions for today's interconnected applications - including service-oriented architecture (SOA). Learn more about SOA and Web service management technologies by reading through our broad selection of white papers, on-demand webinars, podcasts and other helpful learning resources.
Tags : 
progress, actional, soa, management, interconnected application, application management
    
Progress Software BTA Financial
Published By: Progress Software BTA Telecommunications     Published Date: Oct 26, 2009
Progress Actional is the leader in delivering management products and solutions for today's interconnected applications - including service-oriented architecture (SOA). Learn more about SOA and Web service management technologies by reading through our broad selection of white papers, on-demand webinars, podcasts and other helpful learning resources.
Tags : 
progress, actional, soa, management, interconnected application, application management
    
Progress Software BTA Telecommunications
Published By: Epicor     Published Date: Feb 22, 2010
This white paper details how Web 2.0 technologies support business strategies by improving efficiency, productivity, and collaboration.
Tags : 
epicor, web 2.0, enterprise applications, productivity, business application, it management, integration, soa
    
Epicor
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Plantronics     Published Date: Oct 18, 2013
As communication options and needs increase, clear preferences have emerged regarding the best ways to exchange specific types of information.
Tags : 
plantronics, global workforces, anywhere-anytime attitude, brainstorming, collaborating, communications tool belt, phone conferences, audio conferences, web conferences, video conferences, social media, communication technologies, team strategies, office environment, gaining consensus, critical information, technology innovations
    
Plantronics
Published By: ThreatTrack Security     Published Date: May 21, 2015
Watch this webinar for a discussion on: • Advanced threats and their potential points of entry • Why Advanced Targeted Attacks will continue to confound organizations with even the best defenses • Methods, practices, and technologies to help quickly detect and respond to these advanced attacks
Tags : 
advanced threats, advanced targeted attacks, security, cybersecurity
    
ThreatTrack Security
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.