site pro

Results 76 - 100 of 586Sort Results By: Published Date | Title | Company Name
Published By: Alibaba Cloud SEA     Published Date: Mar 11, 2019
Customers have grown accustomed to high speeds and reliable connectivity. One second of network delay when accessing website, mobile app, or application service can increase your bounce rate and even decrease your customer’s trust in your brand. The typical business pain points per the above scenario are always like: Latency – While, latency problems caused by geographic distance are impossible to solve on the public Internet; Availability – Packet loss and complaints from customers can prevent you from increasing your user base; Cost - The growth of your user base and your business needs both outpace your IT budget. Security - Connections over the public Internet are vulnerable to DDoS attacks and other threats. This whitepaper describes: • Challenges that Magic Video faced before implementing Alibaba Cloud’s solutions • How Alibaba Cloud’s solutions help Magic Video build a global hybrid enterprise network, accelerate content delivery of the application, and maximize bandwidth?
Tags : 
data center, cloud computing, networking, security, china, global expansion
    
Alibaba Cloud SEA
Published By: Schneider Electric     Published Date: Oct 17, 2016
This paper explains how the requirements for building management are affected by the presence of a mission critical data center or IT room (data rooms) and describes key attributes to look for in an effective BMS system. Common pitfalls of implementing and using a BMS for sites with IT along with advice on how to avoid them are also provided.
Tags : 
    
Schneider Electric
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
With a powerful, modern cloud commerce solution, e-commerce sites don’t need to sacrifice functionality, customization, or site experience to gain agility. Download this whitepaper to learn four key considerations to keep in mind when evaluating SaaS commerce solutions to achieve agility without compromise.
Tags : 
    
Oracle Commerce Cloud
Published By: Oracle Commerce Cloud     Published Date: Sep 06, 2017
An online transformation is changing how the world’s most successful B2B companies engage buyers, acquire customers and drive ongoing revenue. To survive this transformation, today’s B2B e-commerce sites must do more than simply exist as a portal for selling products; they must be compelling, relevant and simplify the buying process. This eBook examines the factors and impact of this migration, and describes seven best practices for adapting and succeeding in this new era.
Tags : 
    
Oracle Commerce Cloud
Published By: Limelight     Published Date: Feb 16, 2018
Websites are indispensable for many companies to build their profits, but as the threat of cyber attacks increases, websites can also be a serious risk factor. Therefore companies need to simultaneously develop both the convenience and security of websites. This whitepaper outlines the optimal solution for smartly achieving these two aims at the same time.
Tags : 
content delivery network, cybersecurity, ddos, waf, web application firewall, cdn, distributed denial of serivde, cloud security, ddos attack, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
People today expect to have a compelling, interactive, and engaging digital experience. Few companies can exist without a website. In a lot of cases, the Internet is the main stream for their customers to gather information, and the performance of their website directly affects their business. So, what measures can companies take to prevent site delays and improve performance? This white paper will explain the mechanism of a CDN and points to consider when selecting a CDN service.
Tags : 
content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, website performance, website acceleration, digital rights management, drm
    
Limelight
Published By: Limelight     Published Date: Feb 16, 2018
When it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buffers three times, and the majority of people will not wait more than 5 seconds for a website to load. Organizations looking to deliver great digital experiences for their customers often choose to deliver that content using Content Delivery Networks (CDNs). Using multiple CDNs to deliver these digital content experiences promises even greater levels of availability and performance. But it brings with it a host of questions. In this paper we’ll explore the 5 things you should know about multi-CDN in order to determine if it might make sense for your business.
Tags : 
content delivery network, cdn, multi-cdn, multiple cdns, website performance, website acceleration, digital content delivery, mobile delivery, global content delivery, live streaming, digital streaming, video on demand, vod, video delivery, over the top content delivery
    
Limelight
Published By: Dell APAC     Published Date: Mar 01, 2019
From the desk to the meeting or somewhere in between, they always get the job done and exceed expectations every time. They excel with powerful technology to keep them on task, so that’s exactly what we give them. Here are more tips on how to keep them in the zone.
Tags : 
    
Dell APAC
Published By: Schneider Electric     Published Date: Mar 28, 2019
Implementing prefabricated modular data centers results in well-understood benefits including speed of deployment, predictability, scalability, and lifecycle cost. The process of deploying them – from designing the data center, to preparing the site, to procuring the equipment, to installation – is quite different than that of a traditional data center. This paper presents practical considerations, guidance, and results that a data center manager should expect from such a deployment.
Tags : 
predictability, scalability, life cycle cost, schneider electric, - prefabricated data center, modular data center, data center design, data center manager
    
Schneider Electric
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
Für den Vergleich mit VxRail können äquivalente Intel x86 Serverhardware und Speicher von anderen Anbietern als selbst ausgewählte DIY-HCI-Lösung erworben werden. Im folgenden TCO-Vergleich besteht unser Hauptziel darin, eine der VxRail Lösung entsprechende Konfiguration sicherzustellen. Wir haben über die Website für Dell PowerEdge-Rackserver2 die erforderliche Konfiguration und den Preis für Serverhardware, Service/Gewährleistung und Professional Services (PS) ermittelt. Intel Inside®. Neue Möglichkeiten Outside. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, das Intel-Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, das Intel Inside-Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Intel Xeon Phi und Xeon Inside sind Marken der Intel Corporation oder ihrer Tochtergesellschaften in den USA und/oder anderen Ländern
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, das intel-logo, intel atom, intel atom inside, intel core, intel inside, das intel inside-logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Dell and VMWare     Published Date: Oct 26, 2017
Für den Vergleich mit VxRail können äquivalente Intel x86 Serverhardware und Speicher von anderen Anbietern als selbst ausgewählte DIY-HCI-Lösung erworben werden. Im folgenden TCO-Vergleich besteht unser Hauptziel darin, eine der VxRail Lösung entsprechende Konfiguration sicherzustellen. Wir haben über die Website für Dell PowerEdge-Rackserver2 die erforderliche Konfiguration und den Preis für Serverhardware, Service/Gewährleistung und Professional Services (PS) ermittelt.
Tags : 
    
Dell and VMWare
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
Für den Vergleich mit VxRail können äquivalente Intel x86 Serverhardware und Speicher von anderen Anbietern als selbst ausgewählte DIY-HCI-Lösung erworben werden. Im folgenden TCO-Vergleich besteht unser Hauptziel darin, eine der VxRail Lösung entsprechende Konfiguration sicherzustellen. Wir haben über die Website für Dell PowerEdge-Rackserver2 die erforderliche Konfiguration und den Preis für Serverhardware, Service/Gewährleistung und Professional Services (PS) ermittelt.
Tags : 
    
Dell and Nutanix
Published By: Reevoo     Published Date: Jan 13, 2012
It goes against every instinct, but displaying negative reviews on your website helps sales online and offline. And that's not all. Bad reviews can also increase customer loyalty and life-time value, provide unbeatable business insight and help you win back unhappy customers
Tags : 
reevoo, reviews, customer experience, customer satisfaction, marketing, business, customer loyalty, business insight
    
Reevoo
Published By: Aternity     Published Date: Feb 24, 2016
Governance, Risk Management, and Compliance (GRC) organizations are always concerned with violations of Acceptable Use Policies, the scenario of the workforce using a network, website, or system to perform inappropriate actions. But insider threats can also result from legitimate work activities that are being done for illegitimate purposes. Read how a leading insurance company leveraged an End User Experience Monitoring solution to identify employees harvesting customer data before leaving the company.
Tags : 
aternity, grc, risk management, compliance, end user experience, customer data
    
Aternity
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics, security, cybersecurity
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: Carbonite     Published Date: Apr 09, 2018
The core technology behind Disaster Recovery as a Service (DRaaS) has evolved for decades. More recently, DRaaS has linked to the cloud, and finally hit its stride. Today it can provide unprecedented availability options to companies who don’t have secondary data centers dedicated to business continuity. Before now, only IT teams with additional IT budget, staff and geographic locations could effectively hedge against downtime, and disasters. But today’s DRaaS means that businesses of all sizes have the peace of mind that comes with knowing a replica of their data and systems is hosted at a remote site that they can fail over to—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the DRaaS provider. And the technology ensures that a replica is not only available, but always current and immediately available. This attractive value proposition led Gartner to predict that global DRaaS revenue will rea
Tags : 
    
Carbonite
Published By: CA Technologies EMEA     Published Date: Sep 13, 2018
Un logiciel de gestion des portefeuilles de projets (PPM) peut faire la réussite ou l’échec d’une organisation. Le récent boom de la gestion de portefeuille comme fonction métier stratégique a amené de nombreux éditeurs de solutions logicielles d’exécution de projets à « rajouter » à leurs produits des modules PPM (Project and Portfolio Management, gestion de portefeuilles de projets) dans une tentative claire de s’offrir une part du gâteau sur ce marché lucratif et en croissance.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies     Published Date: Aug 24, 2017
Désireux d’accélérer l’innovation, de réduire leurs coûts et d’améliorer l’agilité, beaucoup de responsables métier prennent la décision de migrer les applications de leur entreprise dans des environnements de Cloud public. Or, la réussite de telles stratégies sera dictée en partie par les fonctionnalités de supervision en place. Ce document propose un aperçu détaillé sur les défis que les environnements Cloud peuvent poser en matière de supervision, et les principales approches que les entreprises doivent mettre en place afin d’optimiser les niveaux de service, l’efficacité et l’agilité dans le Cloud.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 24, 2017
Dans l’économie des applications, la réussite d’une entreprise est de plus en plus conditionnée par sa capacité à livrer des applications multicanal offrant une expérience client différenciée et exceptionnelle. Pour garantir les niveaux de service que cela implique, les équipes IT doivent passer à des approches de supervision IT proactives. Ce livre blanc dresse un aperçu des exigences clés que ces équipes doivent remplir afin de mettre en place des fonctionnalités de supervision proactive efficaces.
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: