web

Results 326 - 350 of 4298Sort Results By: Published Date | Title | Company Name
By: Adobe     Published Date: Nov 07, 2013
In Forrester’s 53-criteria evaluation of online testing platform vendors, we identified the seven most significant providers — Adobe, Autonomy, Maxymiser, Monetate, Optimizely, SiteSpect, and Webtrends — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria, and where these vendors stand in relation to each other, to help customer intelligence professionals select the right partner for their online testing needs.
Tags : adobe, forrester wave, online testing platforms, vendor selection, optimize core competency, digital marketers, maturing vendor solutions, future of online testing
     Adobe
By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring
     ExtraHop
By: Red Hat     Published Date: Jan 01, 2012
A world-leading web content management and customer experience management system built its capabilities on the Ixonos Elastic Cloud – which is based on the Red Hat software stack, including value-rich Red Hat Enterprise Linux. Learn how Red Hat Enterprise Linux offered a stable, flexible environment for cloud deployments.
Tags : ixonos elastic cloud, software stack, red hat, ez systems, linux, cloud deployments
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
There’s a reason Red Hat Enterprise Linux is consistently chosen as the operating platform for industry-standard performance benchmarks. Red Hat Enterprise Linux 6 is designed to deliver scale-out and scale-up performance for small and large servers, offering documented scalability up to 4,096 CPUs and 64 Terabytes of RAM.
Tags : database, red hat enterprise, small servers, large servers
     Red Hat
By: Red Hat     Published Date: Jan 01, 2009
The number 1 independent tire retailer tried, unsuccessfully, to build an online platform based on Windows. Ultimately, the company succeeded instead with a solution built with Red Hat Enterprise Linux, Red Hat Network Satellite, Apache, WebLogic, and IBM Lotus Domino Server.
Tags : e-commerce business, red hat, satellite
     Red Hat
By: Red Hat     Published Date: Jan 01, 2013
Don’t let your web infrastructure limit the growth of your online business. Consider Red Hat Enterprise Linux – the ideal platform for transaction-intensive environments. Red Hat Enterprise Linux offers reliability, scalability, and predictable total cost of ownership – as well as a continuous stream of technical improvements – to keep you at the leading edge.
Tags : web, infrastructure, transaction-intensive environment, reliability, scalability, total cost, improvements
     Red Hat
By: join.me     Published Date: Jan 06, 2015
This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.
Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, conferencing solutions, meetings, communication, collaboration
     join.me
By: ServiceNow     Published Date: Oct 02, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use as the Web apps they use at home. Integration remains difficult, because it’s sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
     ServiceNow
By: Teradata     Published Date: Jul 07, 2015
Learn the need for analytics, as well as trends in the government transportation marketplace, from public and private sector experts in this educational webinar by GovLoop and Teradata.
Tags : 
     Teradata
By: Akamai Technologies     Published Date: Mar 19, 2019
Whether you're focused on public-facing websites or your company's assets and users, as someone who cares about digital security, your life is dominated by these trends that characterize the state of all things security in 2019: Attacks are growing, evolving, and becoming more sophisticated. And the types of attacks we see are proliferating. How do you protect your crown jewels when the castle has no walls? The answer is at the edge. When you deploy security at the edge, you are protecting your changing assets closer to the attack itself and moving digital experiences closer to users. In essence, you're deploying a single pane of glass, an extension of your infrastructure, that sits between you - your users, your digital experiences - and the always-changing nature of today's digital environment.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
     Akamai Technologies
By: Citrix ShareFile     Published Date: Jul 02, 2019
Today's businesses need to drive innovation to seize new opportunity, but cloud complexities can slow the agility needed for that innovation. That doesn't have to be the case. In fact, over fifty percent of organizations now use a multi-cloud strategy to help determine their cloud needs, and if you don't have one, we can help. Citrix Workspaces helps reduce cloud complexity, minimize security risks, and deliver a better user experience. Download our e-book and find out how a secure digital workspace: • Centralizes workspace management • Secures your SaaS and web apps, data, and clouds • Makes it a lot easier to scale your cloud infrastructure as needed
Tags : 
     Citrix ShareFile
By: 8x8 Inc.     Published Date: Nov 10, 2016
There are a variety of reasons to consider a hybrid approach, but is it the right path? If moving to the cloud, why not go all in? This webinar explores moving UC to the cloud, the advantages of a full UCaaS) deployment, and the issues a hybrid approach injects into the mix.
Tags : 
     8x8 Inc.
By: Rubrik EMEA     Published Date: Apr 15, 2019
From stolen consumer data to sensitive data leaks, it seems that no one’s data has been safe in recent years. For numerous reasons, like misconfigured storage repositories and unpatched vulnerabilities, this trend is likely to continue. The integration of digital technology into all areas of business has resulted in more of our data being stored on computers and websites targeted by hackers, which has significantly increased the number of data breaches as well as organizations’ vulnerability to malware attacks. For example, the Equifax breach impacted 145 MM consumers, and with more employees working remotely on a wide range of devices, the threat landscape has expanded. The meteoric rise of the public cloud has compounded this issue, as data security requires new knowledge and skill sets in short supply, often leading to misconfigured and insecure solutions. Companies need to adopt the approach that every piece of data in their possession, on-premises or in the cloud, must be encryp
Tags : encryption, data, key, cloud, bits, keys, ciphertext, entropy
     Rubrik EMEA
By: Oracle     Published Date: Nov 22, 2018
Modern marketers leverage insights on how consumers browse goods or make a purchase, to design smarter cross-channel programs and create relevant campaigns. Brands that leverage cross-channel marketing see a 91% customer retention rate. You can do this too. Learn how other marketers in ASEAN are leveraging cross-channel to create real business impact. Join this webinar and hear from Charlie Loo, an award-winning marketer and our Principal Consultant on: • five practical ways you can use cross-channel marketing • the importance of cross-channel in a mobile first environment • the difference between multi-channel and cross-channel
Tags : 
     Oracle
By: Oracle     Published Date: Nov 22, 2018
It is easy to get overwhelmed by the plethora acronyms (RTBs, DMPs,DSPs, SSPs, 1PD, 2PD, 3PD) and knowing when each of them come into play. Driven by data, Programmatic empowers modern marketers with the intelligence required to serve highly personalized ads. By bringing together First, Second and Third Party data at scale, you can target with increased precision and optimize campaigns in real-time. With tech platforms consistently pushing the boundaries of what’s possible in digital advertising, the time for marketers to lean into programmatic is now. Watch this 20 minute webinar with Mandar Dadegaonkar, an award-winning digital marketer and learn from his experience-based advise on: • how to get started and use programmatic tactics that work • insider secrets to boost ROI and improve campaigns • potential pitfalls to watch out for • guidelines for measurement and analytics
Tags : 
     Oracle
By: Akamai Technologies     Published Date: Nov 30, 2016
The latest analysis of cloud security DDoS and web application attacks observe across the Akamai Intelligent Platform for Q32016. Highlights include analysis of the latest wave of mega attacks, a look at NTP trends and shrinking of NTP reflection capabilities, and a look at how bot activity can create DDoS-like conditions.
Tags : akamai, ddos, web application attacks, ntp, akamai intelligent platform, security, enterprise applications, business technology
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 07, 2016
Many industry experts advise financial services institutions (FSIs) to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. While it’s important to harness the digital technologies today’s customers turn to — especially when it comes to engaging the millennial generation — FSIs need to optimize web and mobile performance to deliver exceptional end-user experiences. Here are eight considerations. Get started on your journey – download the whitepaper today
Tags : online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 07, 2016
Digital Transformation in Financial Services: Progress, Priorities, and Obstacles across North America
Tags : online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 07, 2016
Leveraging Technology to Improve Customer Engagement — A Guide for Financial Services Institutions
Tags : online banking service, online banking services, online banking application, online banking applications, online banking app, online banking apps, financial services it, online banking solutions
     Akamai Technologies
By: Websense     Published Date: Oct 06, 2014
This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain
Tags : apts, understanding apts, apt security strategy, stages of advanced threats
     Websense
By: SAP     Published Date: Sep 19, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: SAP     Published Date: Sep 28, 2017
Everything is changing in retail. Stores are becoming an omni channel experience; fulfilment and service centers and smart showrooms are enabling endless-aisle commerce. eCommerce and mobile customer experiences are changing retail, as retailers are now entering the third generation of ecommerce, in which IDC identifies eight core capabilities at the heart of the transformation of key operating models. Omni-channel fulfilment practices and new merchandise planning archetypes are emerging to drive profit, and retail technology is fundamentally changing, as digital transformations take shape in the industry. Websites, smartphones, the Internet of Things (IoT), and wearables change customers and their journeys, while 3D printing changes value chains and products, while IoT changes products, stores, and logistics, and artificial intelligence (AI), probably the most pervasive agent of change, will underpin new levels of customer individualization and workforce efficiencies.
Tags : business models, innovation, omni channel, ecommerce, commerce platform, retail
     SAP
By: Oracle Corp     Published Date: Oct 02, 2012
Why the Secret to Loyalty is Customer Experience
Tags : free webinar, customer, oracle, loyalty, crm, customer care, business technology
     Oracle Corp
By: ServiceNow     Published Date: Jul 12, 2013
"Unauthorized software, painful software license compliance audits, long fulfillment times, limited visibility, unaccountability... if these issues sound familiar, you are not alone. These are real challenges faced by many IT organizations - with serious consequences if not properly addressed. During our Software Asset Management webinar you will learn how having asset, configuration and other service management processes together in one system of record provides the control and visibility you need to overcome these challenges."
Tags : software, asset management, software asset management, webinar, software development, it management, data management, business technology
     ServiceNow
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com