web app

Results 251 - 275 of 938Sort Results By: Published Date | Title | Company Name
Published By: Amazon Web Services     Published Date: Nov 28, 2017
Les clients professionnels peuvent tirer parti des nombreux avantages qu'offre Amazon Web Services (AWS) pour parvenir à l'agilité commerciale, réaliser des économies de coûts et offrir une haute disponibilité, et ce en exécutant leurs environnements SAP sur le cloud AWS. La plupart des clients professionnels exécutent aujourd'hui leurs charges de travail de production sur AWS, y compris celles qui tournent sur des bases de données autres que SAP (Oracle, MS SQL, DB2) ou sur des bases de données SAP (SAP HANA, SAP ASE). Pour prendre en charge la demande d'instances à mémoire élevée, AWS a dévoilé la feuille de route des instances SAP HANA (8 To et 16 To en 2018) et vient de rendre disponibles les instances x1e de 4 To. Parmi les quelques exemples qui illustrent de quelle façon AWS a aidé les clients SAP à réduire les coûts et à améliorer les performances, ainsi que l'agilité, citons BP qui a diminué d'1/3 le coût de son infrastructure SAP, Zappos qui a réussi la migration vers SAP H
Tags : 
    
Amazon Web Services
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
While the choices facing you may seem daunting, the truth is that there’s never been a better time to shop for a web application firewall. WAF technology is now more accessible, affordable, and manageable than ever before—which is a good thing, because companies need the protection a WAF offers now more than ever. For more information about choosing the WAF that’s right for you, visit f5.com/security.
Tags : 
waf, companies, management, technology
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 14, 2018
When most people think of denial of service (DoS) attacks, they think of the large pipe-saturating distributed denial of service (DDoS) attacks aimed at the network layer. However, attacks on website or application availability are not just volumetric in nature. Many attacks are designed to cause resource exhaustion somewhere in the application stack, the application servers, middleware, or back-end database.
Tags : 
    
F5 Networks Inc
Published By: Microsoft     Published Date: Mar 31, 2017
Visual Studio 2015 hilft Ihnen dabei, großartige Ideen in großartige Geschäftsanwendungen zu verwandeln. Mit unserer flexiblen Cloudplattform und den für Unternehmen konzipierten DevOps-Tools können Sie nun noch einfacher skalierbare, hochmoderne Geschäftsanwendungen für jede beliebige Plattform (Web, mobile Geräte, Cloud oder lokal) entwickeln. Erstellen Sie mit der leistungsstarken Entwicklungsumgebung von Visual Studio beeindruckende Apps für Windows, Android, iOS und das Web. Arbeiten Sie über die Cloud zusammen – mit Versionskontrolle, Agilität, Continuous Delivery und App-Analysen sowie mit jeder beliebigen Programmiersprache und für jede beliebige Plattform.
Tags : 
mobile applications, mobile apps, ios, .net, devops, android
    
Microsoft
Published By: Sophos     Published Date: Mar 30, 2017
With an estimated 500,000 'Internet of Things' devices using default security credentials it's little wonder that the recent Mirai botnet's DDoS attack was able to cause such widespread disruption. But it isn't just the average home-user that's at risk. Organizations like yours are being targeted with bespoke malware in order to compromise your network and add your servers and devices to malicious botnets. This paper explains why these attacks are so successful, how a typical infection takes place and what security systems your organization should have in place to defend against botnet proliferation.
Tags : 
web protection, email protection, web application firewall, intrusion protection, sandboxing, threat protection
    
Sophos
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Pure Storage     Published Date: Mar 15, 2018
The all-flash array (AFA) market has undergone significant maturation over the past two years. A high percentage of customers have already committed to an "all flash for primary storage" strategy, and every customer interviewed for this study was among those. In 2017, AFAs will drive over 80% of all primary storage revenue. All of the established storage vendors have entered this space, and there are several start-ups with over $100 million in revenue. With this level of market maturation, multiple segments have developed within the primary flash array space. There are systems targeted for dedicated application deployment, there are systems specifically for web-scale applications, and there are systems intended for dense mixed workload consolidation. These latter systems are driving most of the AFA revenue, and they aspire to become the primary storage platforms of record for enterprises of all sizes. This study evaluates the suitability of 10 vendors' AFA platforms for dense mixed ent
Tags : 
    
Pure Storage
Published By: IBM     Published Date: Aug 08, 2016
Hybrid cloud has emerged as the cornerstone for digital transformation, enabling developers to create unique and compelling mobile, IoT, and web applications while extending their IT investments and capabilities. Attend this webinar to learn how you can leverage your WebSphere Application Server infrastructure and investments to maximize performance, lower costs, and successfully move forward into a hybrid cloud world.
Tags : 
ibm, cloud, hybrid cloud, middleware, application infrastructure, websphere application server, cloud, business technology
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
This IDC Business Value Executive Brief leverages IDC's research into the value of cloud-based application development and integration solutions, including solutions such as IBM WebSphere Application Server (WAS) on cloud.
Tags : 
ibm, middleware, cloud ibm, middleware, application infrastructure, open source application servers, business technology
    
IBM
Published By: IBM     Published Date: Nov 17, 2016
This webcast will help you understand how your business can benefit from the IBM MQ Appliance, and where it can fit into your business today.
Tags : 
ibm, middleware, mq appliance, ibm mq appliance, hardware, knowledge management, business technology
    
IBM
Published By: Oracle     Published Date: Mar 04, 2019
n this webinar, Andy Baxendale and Euan Semplediscuss the future role of blockchain and how it could be specifically applied to human capital management systems. They look at:• Why HR has one of the best use-cases for blockchain technology• What aspects of HR would benefit most from blockchain technology • The potential overlaps between artificial intelligence and blockchain technology
Tags : 
    
Oracle
Published By: CA WA     Published Date: May 12, 2008
Emerging information technologies like composite and multi-tier applications, service oriented architectures (SOA), virtualization, grid and cluster computing, and Web Service-based application delivery create an extraordinary opportunity for IT managers. With these dynamic technologies, they can provide business owners with IT services that are extremely flexible and agile, driving a more dynamic and competitive business.
Tags : 
ca wa, workload automation, roi
    
CA WA
Published By: BMC Control M     Published Date: Jul 16, 2009
Workload Automation (WLA) ist eine moderne Entwicklungsstufe des Job-Scheduling und dient zum Automatisieren von komplexen Verarbeitungsabläufen in der IT. Es unterstützt ereignisgesteuerte Workloads, unterschiedliche Plattformen, Webservices, komponentenbasierte Anwendungen (Composite Applications), SOAs, virtuelle Systeme, System- und Anwendungsintegration, Business Alignment (Abstimmung mit den Geschäftsprozessen) und vieles mehr.
Tags : 
workload, automation, smart, bmc, wla, ema, itil, soa, bmc conrol-m
    
BMC Control M
Published By: BMC Control M     Published Date: Jul 16, 2009
L’automatisation de la charge de travail (Workload Automation ou WLA) est une version aboutie de la planification des tâches qui permet d’automatiser des traitements informatiques complexes et qui accepte des charges de travail basées sur des événements, des plates-formes multiples, des services Web, des applications composites, des architectures orientées services (SOA), des systèmes virtuels, l’intégration des systèmes et des applications, l’alignement des services métier, etc.
Tags : 
wla, ema, bmc control-m, soa
    
BMC Control M
Published By: BMC Control M     Published Date: Sep 15, 2009
This paper, from industry analyst firm Enterprise Management Associates, explores how workload automation can help IT reduce outages, consolidate vendors, improve integration, and cut costs. Learn more. Download the white paper, "IT Automation: Going Beyond the Obvious to Find Real Cost Savings."
Tags : 
bmc control-m, enterprise management associates, workload automation, wla, peoplesoft, sap, oracle, as/400, openvms, extract-transfer-load, etl, business service managemen, bsm, service level managemen, slm, mainframe, windows, unix, linux, custom applications
    
BMC Control M
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security
    
Fortinet, Inc.
Published By: Citrix Systems     Published Date: Jul 28, 2015
Discover why NetScaler AppFirewall earns a Recommended rating in NSS Labs’ Web Application Firewall (WAF) Public Test.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Sep 17, 2015
Learn how Citrix XenApp allows a single image of a browser to be hosted centrally and delivered on-demand, providing a simple and secure way to manage browsers and apps.
Tags : 
citrix, xenapp, apps, browsers, it solutions, networking, it management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jan 26, 2016
Attend this webinar to learn about the top app virtualization use cases, complete with real-world customer examples. We’ll also discuss the key differences between the new app virtualization capabilities of VMware Horizon and Citrix XenApp.
Tags : 
vmware, citrix, xenapp, mobile, app virtualization, productivity, it management, business technology
    
Citrix Systems
Published By: Teradata     Published Date: Jun 12, 2013
Because subpar analytics put customer relationships at risk, Forrester is redefining the modern practice of web analytics as "digital intelligence." This new approach to analytics brings a set of expanded requirements and calls on firms to consider their technology frameworks, organizational structures, metrics, and optimization practices.
Tags : 
web analytics, data driven marketing, digital intelligence
    
Teradata
Published By: Microsoft     Published Date: Nov 08, 2013
Find out why developers increasingly choose .NET to create new applications faster and more efficiently and why it offers the clearest path from the client/server world to the emerging device/cloud world.
Tags : 
microsoft, develop better applications, technology guide, business applications, application patterns, devices, web applications, native applications, data-centric business, microsoft office, microsoft sharepoint, mission-critical enterprise, business processes, bring-your-own-device, line-of-business, .net framework
    
Microsoft
Published By: Riverbed     Published Date: Apr 12, 2017
AWS makes it simple to set up cloud-based resources. But do you have secure, high-capacity, high-performance connectivity to and between AWS cloud instances? That’s where Riverbed comes in. Riverbed’s SD-WAN solution enables cloud migration and performance, all managed via quick and simple workflows. Register for the upcoming webinar to experience a fundamentally new approach to networking, with real users sharing their experience in addition to a joint customer, OpenEye that has saved time and money by utilizing this approach to cloud networking. OpenEye Scientific Software leveraged Riverbed SteelConnect to very quickly and easily establish secure connections to and between AWS VPCs, saving hours of network administration time.
Tags : 
    
Riverbed
Published By: Code42     Published Date: Mar 31, 2017
Watch this on-demand webinar to explore three distinct migration approaches taken by real businesses.
Tags : 
    
Code42
Published By: Red Hat     Published Date: Mar 11, 2016
Innovative and agile IT, as both a strategy and a means of delivering new applications, requires a fundamental shift in processes, applications, and infrastructure. This web book sheds light on the cloud infrastructure and tools required to support agile IT methods and applications and demonstrates why open source technology is the best way to achieve the full benefits of this new, rapid mode of IT service delivery.
Tags : 
    
Red Hat
Published By: ServiceNow     Published Date: Mar 24, 2015
Technology has become the heart and soul of every business. The hardware boundaries of IT have exploded beyond data centers, with mobile devices in the hands of both employees and customers alike. Application options have blossomed, from traditional to open source to software-as-a-service. Business has become global, bringing with it a demand for round-the-clock agility. Employees expect that the applications they use at work should be as easy to use the Web apps they use at home. Integration remains difficult, because it's sometimes impossible to know what will happen when someone tries to pluck one strand out of the pile. IT workload and system complexity will only get more challenging, bringing the need for disintermediation through service automation.
Tags : 
future it, service automation, it workload, integration, data centers, mobile devices, software-as-a-service, web apps, it management
    
ServiceNow
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.