web applications

Results 301 - 325 of 340Sort Results By: Published Date | Title | Company Name
By: KEMP Technologies     Published Date: Aug 04, 2008
Websites have become critical components of most businesses’ core operations. They support the brand and ordering process, serve as data information resources and assist in overall customer care. Having poor website performance or poor reliability can destroy or severely damage a business and its reputation. The increasing importance of these websites leads to critical requirements of security, reliability and scalability. Delivering these, however, can leave an SMB stretched beyond its resources.
Tags : load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies
     KEMP Technologies
By: Tail-f Systems     Published Date: Oct 01, 2008
Network management systems must adapt to meet the requirements of next generation networks.  For example, a user interfaces may need to be refreshed with a state-of-the-art Web interface or support for the NETCONF protocol may be required to help customers deploy scalable networks. Adding functionality and integrating with existing applications and data stores has multiple trade-offs in terms of development time and system efficacy.
Tags : network management, next-generation networks, netconf, legacy networks, network management systems, tail f, tail-f, tailf, networking
     Tail-f Systems
By: ConcertTech     Published Date: Jun 03, 2009
As the third in our series, this paper continues the effort of providing information that enables you to evaluate a deployment company and its Technology Rollout System intelligently so that you can realize the most cost-effective and time-efficient project deployment.
Tags : rollout, global technology, deployment, concert technology, project facilitator, project manager, internal resources, job functions, delivery team, program, delivery team, web-based software, applications, warehouse, unified resource, dedicated resource, hybrid, enterprise applications
     ConcertTech
By: HP - Enterprise     Published Date: Nov 19, 2008
This webinar explores 12 of the most common security traps in Java by examining the causes of security failures in modern Java–based applications. Approaching security with an “outside in” style, we look at vulnerabilities from a developer’s perspective, focusing on the source code.
Tags : security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify
     HP - Enterprise
By: HP - Enterprise     Published Date: Jun 05, 2013
It wasnt long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasnt enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, youll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : mobile applications, ecosystem, risk, defense, application, risk
     HP - Enterprise
By: Oracle Corp.     Published Date: May 30, 2008
Current trends show that the vast majority of companies are moving to services-oriented architectures (SOAs) and deploying Web services within and across their IT infrastructure.However, the success of those deployments is determined by the integrations and innovations that Web services make possible and how Web services affect the quality and performance of the mission-critical applications with which they interface.
Tags : soa, soas, oracle, application testing suite, web services, mission-critical, enterprise java beans-based, quality assurance, ejb, user interface
     Oracle Corp.
By: BMC Control M     Published Date: Jul 22, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : workload, automation, smart, bmc, wla, ema, itil, soa, bmc conrol-m
     BMC Control M
By: BMC Control M     Published Date: Jul 22, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : wla, ema, bmc control-m, soa
     BMC Control M
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load, service monitoring, port check (standard and custom ports), number of processes running, specific process monitoring, database monitoring, mysql replication monitoring, oracle rman backup monitoring, vpn monitoring: farend ping test, load-balanced ip monitoring, external url monitoring, centralized ids, logging monitoring
     NeoSpire Managed Hosting
By: Adobe     Published Date: May 09, 2011
Forrester recently surveyed 225 Information and Knowledge Management (I&KM) professionals with Web Content Management (WCM) decision-making or influencer roles about their WCM strategies for the coming year.
Tags : adobe, web content management, enterprise application, knowledge management, wcm, analytics, social networking, rich media management
     Adobe
By: WOLF Frameworks     Published Date: Jan 31, 2011
Platform-as-a-Service (PaaS) is an increasingly popular paradigm moving from being a buzzword to the mainstream.
Tags : platform-as-a-service, paas, saas, cloud computing, paas types, paas advantages, paas monetization, paas pricing, paas service levels, application development, web applications, software-as-a-service
     WOLF Frameworks
By: Citrix Systems     Published Date: Sep 08, 2011
Today's advanced datacenters need flexible, multi-tenant ADCs to deliver on the full promise of virtualization and cloud computing. This free Citrix white paper explains why!
Tags : citrix, netscaler, adc, web applications, database scalability, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
     Citrix Systems
By: Citrix Systems     Published Date: Sep 08, 2011
Citrix NetScaler goes beyond traditional ADCs, taking performance, scalability, reliability and security of critical web applications to the next level. Free white paper explains how!
Tags : citrix, netscaler, application performance, service delivery, infrastructure, web applications, tcp, ssl, datastream technology, delivery optimization, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
     Citrix Systems
By: Tibco Spotfire     Published Date: Nov 30, 2011
In this recorded webinar you will also learn why in-memory architecture and collaborative functionality are key to successful Agile BI applications.
Tags : 
     Tibco Spotfire
By: Riverbed     Published Date: Nov 08, 2012
Stingray traffic manager 9.0 now includes the capability for industry-leading web content optimization, dramatically accelerating web-based applications and more. Read on to learn about the industry's only ADC with complete WCO integration.
Tags : stingray, adc, wco, wco integration, web content management, web content optimization, enterprise applications, business technology
     Riverbed
By: Riverbed     Published Date: Nov 08, 2012
No one likes to wait. Today everyone expects instantaneous responded from website and applications, and the longer they take to deliver, the more likely people will shift their attention. Learn how Stingray accelerates websites and other web apps.
Tags : stingray, aptimizer, web content optimization, accelerate websites, riverbed, enterprise applications, data management, business technology
     Riverbed
By: Adobe     Published Date: Oct 19, 2012
As consumers access online content on more devices - computers, smartphones, tablets and even gaming consoles - managing and delivering digital content has grown exponentially more complex. Learn how rethinking WCM will help you thrive in complexity.
Tags : mobile content management, cms, content management systems, wcm, web content management, mobile content planning, mobile applications, software development, business technology
     Adobe
By: Adobe     Published Date: Feb 20, 2014
Adobe positioned highest in Ability to Execute and Completeness of Vision in Gartners Magic Quadrant for Web Content Management. Gartners evaluation is based on Adobe Experience Manager, part of the Adobe Marketing Cloud. Adobe is named a Leader and is positioned highest in both Ability to Execute and Completeness of Vision.
Tags : gartner, adobe, adobe social, digital asset management, web content management, adobe experience manager, aem, internet marketing, marketing, customer engagement, user experience, mobile applications, content management
     Adobe
By: SAP     Published Date: Jul 17, 2012
In spite of the growth of virtual business activities performed via the World Wide Web, every business transaction or operation is performed at a physical place. And as handheld GPS devices drive a growing awareness of the concept of "location," people are increasingly looking for operational efficiencies, revenue growth, or more effective management as a result of geographic data services and location-based intelligence. In this white paper, David Loshin, president of Knowledge Integrity, Inc., introduces geographic data services (such as geocoding and proximity matching) and discusses how they are employed in both operational and analytical business applications. The paper also reviews analytical techniques applied across many types of organizations and examines a number of industry-specific usage scenarios.
Tags : business, sap, white paper, technology, location, intelligence, business value, data services, business technology
     SAP
By: Turn     Published Date: May 20, 2013
Forrester Consulting examined the potential return on investment (ROI) enterprises may realize by utilizing Turn Audience Suite and Turn Campaign Suite. Learn how this brand achieved a 50% ROI and attributes 80% of its digital media services revenue growth to Turn.
Tags : turn, digital media buying, roi, web applications, data management platform, dmp, dsp
     Turn
By: Juniper Networks     Published Date: Sep 10, 2014
Concerned about attacks on web-facing applications? Download the Whitepaper to understand the limitations of next-generation firewalls and learn about three technologies that protect web applications and data centers.
Tags : next generation firewalls, application attacks, web-facing applications, firewall limitations, protection technology, data center
     Juniper Networks
By: Amazon Web Services, Inc     Published Date: Sep 19, 2013
Amazon Web Services (AWS) provides a secure and dependable environment for deploying Microsoft Exchange Server 2010. Customers can use their existing Windows Server applications licenses, such as MS Exchange or SharePoint, on AWS without paying additional licensing fees. Take advantage of the pay-as-you-go-pricing, scalability, and data integrity of the AWS Cloud to run your Exchange Server workloads today. Download the Planning and Implementation Guide to learn more.
Tags : aws exchange, microsoft exchange, micrsoft exchange server, microsoft exchange download, microsoft exchange server download, ms exchange, ms exchange server, ms exchange download, ms exchange server download, exchange server, cloud computing, web services, exchange services, web service management, platforms, server applications, it management, business technology
     Amazon Web Services, Inc
By: IBM     Published Date: Apr 22, 2014
Learn how your business can push targeted campaigns across your mobile, tablet and desktop websites in minutes in this interactive demo.
Tags : ibm, emm, smartphone, mobile, push notifications, push marketing, targeted campaigns, mobile device, tablet, desktop website, customer engagement, mobile applications
     IBM
By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, its online fraud to the highest degree. Although its been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : cyveillance, phishing, security, cyberattacks, cybercriminals, threats
     Cyveillance
By: Nginx     Published Date: Jun 25, 2014
Learn four concrete tips to help you avoid benchmarking confusion, so you can achieve the most accurate and understandable results.
Tags : riverbed, application delivery, application development, application infrastructure, application performance, enterprise software, load balancing, open source, server software, web applications, web servers, software testing, testing and analysis, it management, enterprise applications
     Nginx
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com