web app

Results 201 - 225 of 945Sort Results By: Published Date | Title | Company Name
Published By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this latest Data Science Central webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team a
Tags : 
    
Trifacta
Published By: Trifacta     Published Date: Feb 12, 2019
Over the past few years, the evolution of technology for storing, processing and analyzing data has been absolutely staggering. Businesses now have the ability to work with data at a scale and speed that many of us would have never thought was possible. Yet, why are so many organizations still struggling to drive meaningful ROI from their data investments? The answer starts with people. In this webinar, guest speakers Forrester Principal Analyst Michele Goetz and Trifacta Director of Product Marketing Will Davis focus on the roles and responsibilities required for today’s modern dataops teams to be successful. They touch on how new data platforms and applications have fundamentally changed the traditional makeup of data/analytics organizations and how companies need to update the structure of their teams to keep up with the accelerate pace of modern business. Watch this recorded webcast to learn: What are the foundational roles within a modern dataops team and how to align skill set
Tags : 
    
Trifacta
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: Oracle     Published Date: Jul 05, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
advanced traffic steering, global internet visibility, open programming interfaces, risk management tools, secondary dns
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Today’s network edge is increasingly taking on a critical role in connecting users to the digital content and web services that they need to reach. This is driving a new approach to load balancing that starts at the edge. Powered by DNS, edge-based global load balancing (GLB) steers user traffic to destination endpoints based on IT-defined policies. GLB works independently or in concert with site-based, or on premises, load balancing technologies in a “federated” system. This approach applies load balancing and traffic steering policies at each layer from the user edge to the host—whether virtual or physical—where the request is actually served.
Tags : 
geo-zoning, path, optimization, resource, asset, balancing, virtual, resource
    
Oracle Dyn
Published By: Netsuite     Published Date: Jul 24, 2017
When was the last time you upgraded your ERP system? Not just patched, fixed or tinkered with it—but implemented a substantive upgrade that enabled real business innovation, generated excitement and unleashed a wave of ideas and productivity from your users? You know—the same kinds of enthusiasm that greets web or iPhone apps like Instagram, Spotify, Netflix, etc.?
Tags : 
    
Netsuite
Published By: Civica Digital     Published Date: Sep 28, 2018
If there’s one thing that stands out about central government, it’s the appetite for digital transformation. Whether delivering new customer-facing websites to drive better engagement with services or establishing a centre of excellence to accelerate the take-up of robotic process automation (RPA), UK government is embracing opportunities to modernise with new technologies. But despite the great strides made in the last few years, the UK is slipping backwards in E-Government development terms – down from #1 in 2016 to #4 in 2018, according to the UN E-Government Survey 2018. Some argue this is due to the government having tackled the more straightforward digitisation opportunities and because it is now facing the bigger, more complex systems that need modernising. Our research shows that there are also wider challenges, including uncertainty around the impact of Brexit, budgetary pressures and emerging technologies, coming into play. So what needs to happen to overcome our challenges
Tags : 
    
Civica Digital
Published By: athenahealth     Published Date: Apr 30, 2013
Our web-based patient communication system and services go well beyond medical scheduling software by improving all patient interactions outside of the office. Learn how physicians can communicate with patients online and improve their bottom lines with our unique approach to medical scheduling software and other automated messaging services.
Tags : 
healthcare, medical, hitech act, ehr, patient engagement, practice efficiency, self-pay collections
    
athenahealth
Published By: Zscaler     Published Date: Oct 26, 2018
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.” Organizations understand that protecting users with a consistent and enforceable policy requires much more than simple URL or web filtering. Thousands of companies have already switched their IT security from appliances to experience the benefits of the Zscaler™ Security Cloud. Download this whitepaper today to find out why.
Tags : 
    
Zscaler
Published By: Arbor     Published Date: Sep 15, 2014
DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.
Tags : 
ddos attacks, it security, application layer attacks
    
Arbor
Published By: RelayHealth     Published Date: May 31, 2013
Join RelayHealth for a recorded Healthcare Finance News webinar, Accelerating Service-to-Payment Velocity. With all of the changes happening in healthcare today, some things do remain the same. Your two primary sources of cash are still patients and third-party payers. While patient financial responsibility is rapidly increasing, a large percentage of revenue still flows in via governmental payers and commercial health plans.
Tags : 
accelerate payment, payment resolution, service-to-payment velocity, claims data, continuing education credit
    
RelayHealth
Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Attacks have many phases. Before launching, the attacker needs to stage internet infrastructure to support each phase. Two early phases are to redirect or link to a malicious web domain or send a malicious email attachment. For the former, most attacks leverage exploit kits (e.g. Angler) as the first stage before dropping the final payload. Cisco Umbrella effectively blocks initial exploit and phishing domains. Unlike appliances, our cloud security platform protects devices both on and off the corporate network. Unlike agents, the DNS layer protection extends to every device connected to the network — even IoT. Umbrella truly is the easiest and fastest layer of security to deploy everywhere. Download today to find out more.
Tags : 
    
Cisco Umbrella EMEA
Published By: Aerohive     Published Date: Oct 27, 2015
Questo webinar è rivolto a specialisti IT interessati ad apprendere, implementare ed espandere le reti wireless nella propria organizzazione.
Tags : 
wlan, wi-fi, wireless networks, wireless architectures, networking
    
Aerohive
Published By: IBM     Published Date: May 25, 2016
Move your existing on-premises Java applications to the cloud by literally “lifting and shifting” your applications, unchanged, in minutes, with IBM WebSphere Application Server on Cloud.
Tags : 
ibm, middleware, application infrastructure, cloud, application, ibm websphere application server, business technology
    
IBM
Published By: IBM     Published Date: May 25, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, application infrastructure, application servers, ibm was liberty, business technology
    
IBM
Published By: IBM     Published Date: May 02, 2017
There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For today's digital business, this perimeter-based security model is ineffective against malicious insiders and targeted attacks. Security and risk (S&R) pros must eliminate the soft chewy center and make security ubiquitous throughout the digital business ecosystem — not just at the perimeter. In 2009, we developed a new information security model, called the Zero Trust Model, which has gained widespread acceptance and adoption. This report explains the vision and key concepts of the model. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.
Tags : 
resource management, product data, remote services, asset management, cloud management, web applications, application scheduling, internet of things
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 3 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." As distributed edge environments become more critical, physical security becomes more important. Nobody would leave their data center wide open for anyone to enter, but that’s exactly how many organizations treat their edge computing sites. Often, they consist of a rack or two of gear in a non-dedicated location, perhaps a janitor’s closet, with little to no physical security. Fill out your information and click "Register" to watch the third event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Protect me from Downtime!” This webinar originally aired on November 9th, 2017. In this webinar, we discuss physical security best practices, including environmental issues such as temperature and humidity monitoring. We also update partners on the physical security features of the latest APC racks and the NetBotz line of security and environmental appliances, cameras and sensors.
Tags : 
    
Schneider Electric
Published By: Schneider Electric     Published Date: Jan 26, 2018
The 4th and final event in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." Customers have lots of decisions to make as they feel their way through the changing IT landscape. Which infrastructure and applications should stay on their own premises (if any) and what can they safely move to the cloud? Fill out your information and click "Register" to watch the fourth and final event in our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Should I Stay or Should I Go?” This webinar originally aired on December 7th, 2017. This final webinar in our webinar series is focused on ways partners can help customers answer the types of questions above and, in the process, become trusted advisors. We’ll go over how to use tools including the EcoStruxure IT suite to analyze customer traffic and help them decide the best home for each application, whether on-premises or in the cloud. (Hopefully we’ll figure out a way to work in the classic Clash tune as well!)
Tags : 
    
Schneider Electric
Published By: EMC Corporation     Published Date: Mar 12, 2014
Explore the Big Data universe: Launch your mission with the EMC Big Data Explorer web app.
Tags : 
emc, digital data, data growth, idc report, big data, internet of things, customer behavior, data management, business technology, data center
    
EMC Corporation
Published By: Blue Coat Systems     Published Date: Jun 30, 2011
This security report provides an overview of the changing ways in which people are using the Internet and the new methods cybercrime is using to target their attacks.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring
    
Blue Coat Systems
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.