web

Results 326 - 350 of 4250Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Today every business is focused on their customers, and finding ways to better understand and serve them with differentiated digital experiences. With all of the choices available, users have become highly demanding, and quickly lose patience and trust when web and mobile app experiences are poor. Today’s digital user demands rich, engaging content that is fresh, personalized, and fast. If your websites and mobile apps can’t deliver, they’re gone. This eBook will give you insight into: Monitor how users interact with your online applications by leveraging real user data Optimize behaviors that drive the most revenue impact across user locations and devices Validate whether the optimizations resulted in desired business outcomes using real-world situations
Tags : 
monitor, optimize, validate, digital, experiences
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Retailers competing in the high-pressure world of ecommerce have many challenges. Not only do you need to provide an interesting and compelling shopping experience, you also need to make that experience fast and reliable. But this doesn't need to be difficult - check out our best practices guide that includes: Getting started with performance testing The common challenges faced by online retailers Testing checklist Top ecommerce business metrics Who should be on your testing team The different types of performance tests Testing in production vs. in the lab Security and performance testing
Tags : 
performance, testing, retail, websites, applications, retailers, ecommerce
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Keeping your data safe requires forward-thinking approaches to cybersecurity. Learn how you can augment your existing on-premise infrastructure with security measures in the cloud for a more robust web security posture. Download this guide to learn: Why the cloud is critical for web security How real-world DDoS attacks are testing the limits of on-site solutions Discover the questions some vendors don’t want you to ask
Tags : 
cloud, security, cyber, cloud, web, ddos
    
Akamai Technologies
Published By: Dell-EUC (Dell/Intel Logo) Webinar     Published Date: Nov 13, 2017
In-house PC deployments can be expensive and time consuming and often times result in manual errors, short and long term support challenges, as well as delays in production system deployments. But new deployments don’t have to be hard. In this webinar, you will: 1. Learn about our newest client PC deployment offer ProDeploy Client Suite 2. Understand how we put our customers in control with the self-service portal TechDirect 3. Find out how ProDeploy Plus can help companies save up to 35%* on deployment time *Based on May 2016 Principled Technologies Report commissioned by Dell. Testing results extrapolated from a 10-system deployment to project time savings for larger deployment compared to in-house manual deployment. Actual results will vary. Intel Inside®. Powerful Productivity Outside. Intel logo are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
    
Dell-EUC (Dell/Intel Logo) Webinar
Published By: PGi     Published Date: Nov 07, 2018
Webinare unterscheiden sich von kollaborativen Web-Meetings basierend auf Umfang, Geschäftsverhalten, Geschäftsanforderungen und Erwartungen der Teilnehmer. Webinare sind strukturierte, vorab geplante, One-to-Many LiveEvents, die höchst skalierbar sind und gestreamte Präsentationen sowie DesktopSharing, Stimmenabgaben, Umfragen und Chat-Funktionen bieten. Infolgedessen erfordern sie unterschiedliche Planung, Förderung, Übertragung und Messung.
Tags : 
    
PGi
Published By: PGi     Published Date: Nov 07, 2018
Sie würden in Ihrem Großraumbüro keinen wesentlichen Investorenanruf, keine Kundenveranstaltung oder Aktionärsversammlung durchführen. Warum sollten Sie also eine wichtige virtuelle Veranstaltung auf einer Plattform durchführen, die auf die Zusammenarbeit und Teamarbeit in kleinen Gruppen ausgelegt wurde?
Tags : 
    
PGi
Published By: Oracle     Published Date: Nov 15, 2017
Webcast : Oracle Ravello : a cloud solutions for disposable workloads.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: Oracle     Published Date: Nov 15, 2017
This Webcast displays why choose Oracle Cloud solutions View this video now to find out more.
Tags : 
oracle database, enterprise, quality assurance, data center, server infrastructure, storage management, oracle
    
Oracle
Published By: DellEMC and Intel® Xeon® processor     Published Date: Apr 13, 2017
In this report we’ll explore that question, comparing the cost of an on-site hyperconverged solution with a comparable set up in the cloud. The on-site infrastructure is a Dell EMC VxRailTM hyperconverged appliance cluster and the cloud solution is Amazon Web Services (AWS).
Tags : 
dell emc, cloud, hyperconverged solutions, hyperconvergence, amazon, amazon web services, cloud
    
DellEMC and  Intel® Xeon® processor
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
As a leading provider of SSL certificates, DigiCert is here to help you discover the benefits of using HTTPS across your entire site, and to help you successfully implement it. HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively. Implementing HTTPS Everywhere on your website secures the user and your organization’s data on every page— from start to finish.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Aug 01, 2018
Website security changes are one of the only constants on the web today. By using the right certificates for your website and each webpage, you'll be prepared for any updates as they occur. The right certificate can make all the difference. Although all SSL certificates provide the same level of encryption, high-assurance certificates provide added layers of authentication to give users proof they can trust who you are—which elevates the trustworthiness of your entire site. Here’s how the certificates stack up. High-assurance OV or EV SSL on every page ensures users can easily identify your website as authentic, making it harder for phishing sites to mimic you and defraud your visitors.
Tags : 
    
DigiCert
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Bazaarvoice     Published Date: Aug 12, 2013
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : 
product insights, consumer engagement, business intelligence, consumer insights
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Aug 12, 2013
The FTC social disclosure rules apply to you – now. This webinar shows you how to do social right: Effectively. Ethically. Legally. These guidelines actually keep you out of trouble while building consumer trust along the way.
Tags : 
brand messaging, consumer engagement, social branding, ftc, federal trade commission
    
Bazaarvoice
Published By: MicroStrategy     Published Date: Aug 12, 2012
A panel of industry experts, including Steve Cornett, Director of Enterprise Information Services with Lowe's Companies, Inc.,
Tags : 
microstrategy, mobile, steve cornett, lowe's, roi, business technology
    
MicroStrategy
Published By: MicroStrategy     Published Date: Aug 12, 2012
Hear how Whole Foods Market is using Mobile Business Intelligence to balance both individual store effectiveness and regional uniqueness while promoting the efficiencies of "oneness."
Tags : 
microstrategy, mobile, wholefoods, oneness
    
MicroStrategy
Published By: Webroot     Published Date: Nov 02, 2012
These days, fixing your endpoint security software requires a new approach and it's called "forget the old approach". Download this white paper to learn more.
Tags : 
it security, endpoint security, endpoint protection, security software, security, business technology
    
Webroot
Published By: Webroot     Published Date: Nov 02, 2012
This paper examines the different endpoint security methods for virtualized environments and presents how Webroot® SecureAnywhereTM Business - Endpoint Protection security provides optimal performance, protection and manageability.
Tags : 
endpoint security, virtualization, virtualized environments, security, business technology
    
Webroot
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.