api

Results 1 - 25 of 2207Sort Results By: Published Date | Title | Company Name
Published By: Box     Published Date: Jun 22, 2018
more people than ever before. Whether it's your employees, partners or customers, all your people use enterprise content. And that means content management is becoming increasingly top-of-mind — but companies find it difficult to get it right. In this newsletter, Gartner shares how cloud content management helps you build your content management strategy from the bottom up, enabling you to: o Improve company-wide collaboration and become more customer-centric o Scale your business and reduce cost o Provide security and stability for your entire organization • Download the full Gartner newsletter, Reshaping ECM: New Opportunities in the Cloud. You'll learn about the emerging requirements of top ECM vendors, as well as discover real-world use cases of Cloud Content Management.
Tags : 
    
Box
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Pour les clients des grandes entreprises, IDC prévoit que le flash continuera de devancer la croissance du disque dur, et que la capacité des SSD expédiée augmentera de plus de 75 % d'une année sur l'autre2 . Cette progression s'explique notamment par les prix qui baissent plus rapidement que prévu. Les recherches actuelles indiquent qu'en termes de coût total de possession (CTP) sur quatre ans, le flash deviendra le support au coût le plus faible pour presque tout le stockage à compter de 20163 . Le CTP du flash continuera de décliner jusqu'en 2020, offrant un retour sur investissement que les solutions à disques rotatifs ne pourront pas égaler.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Wie die meisten Unternehmen werden auch Sie vermutlich mit der Datenspeicherung zu kämpfen haben. In einer jährlichen Umfrage von Frost & Sullivan unter IT-Entscheidungsträgern wurde das Speicherwachstum als eine der größten Herausforderungen der letzten fünf Jahre für das Rechenzentrum genannt.2Da Unternehmen exponentiell mehr Daten als je zuvor sammeln, replizieren und speichern, ist schon der einfache Erwerb ausreichender Speicherkapazitäten ein Problem. Hinzu kommt nicht zuletzt, dass Unternehmen von ihren gespeicherten Daten mehr erwarten. Daten werden mittlerweile als kostbares Firmenkapital und Möglichkeit gesehen, sich von den Wettbewerbern zu differenzieren: Sie sollen neue Geschäftsmodelle, neue Umsatzchancen, bessere Informationen, optimierte Betriebsabläufe und niedrigere Kosten bringen. Angesagte Trends wie das Internet der Dinge und Big Data-Analysen generieren so schnell neue Marktchancen, dass IT-Organisationen kaum noch Schritt halten können.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
    
Hewlett Packard Enterprise
Published By: Hewlett Packard Enterprise     Published Date: Apr 20, 2018
Solid-state array features, pricing, scale and density are improving at a rapid pace, while agility and disaggregation benefits are providing long-term value. Gartner has analyzed 19 SSA products across five high-impact use cases to quantify what's important to infrastructure and operations leaders.
Tags : 
    
Hewlett Packard Enterprise
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
Cybercriminals are evolving. Increasingly, they are capitalizing on the open and unprotected nature of the Domain Name System (DNS) to launch damaging phishing, malware, and ransomware attacks. How are you proactively protecting your network and users from these targeted threats? Here are five things to ask yourself as you consider a DNS security solution for your company.
Tags : 
dns, phishing, malware, ransomware, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
96% of users see app performance as important. A fast mobile app helps your app stand out from the rest to attain for the coveted title of “go-to” app. Download this guide to learn: The new benchmark: User expectation of an app’s response time The five key barriers to mobile app performance How to accelerate APIs and optimize image performance without expensive infrastructure or complex development work How advancements in CDN technology beyond basic caching can help improve performance
Tags : 
mobile, app, performance, barriers
    
Akamai Technologies
Published By: DigiCert     Published Date: Jun 19, 2018
No organization is safe from cyber attacks. Organized crime drives the rapid growth and sophisticated evolution of advanced threats that put your entire website ecosystem at risk. And the threat landscape will only grow more dangerous as attackers create more innovative and damaging ways to profit from their efforts. That’s why you need Complete Website Security to harmonize and fortify your website security. Across the board, we deliver best-in-class solutions for securing your website environment. Secure your websites. Protect your business.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. Website security must be evolved in line with these growing threats and challenges. Download this whitepaper to find out more about how Digicert can help.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
Protect your business, brand and customers in a constantly evolving threat landscape. As market and business needs evolve, and the technological arms race between cybercriminals and the security industry continues, the boundaries of website and web security are shifting. This paper explores the opportunities, risks and challenges, associated with this rapidly evolving landscape both from a business and technical standpoint, and lays out key guidelines for building an effective security strategy for the future.
Tags : 
    
DigiCert
Published By: DigiCert     Published Date: Jun 19, 2018
The Internet of Things (IoT) has rapidly transformed the digital landscape and the world we live in. Intelligent devices and sensors connect smart cars, robotic manufacturing equipment, smart medical equipment, smart cities, industrial control systems, and much more in a way that improves lives and saves businesses billions of dollars. But along with its benefits, rapid IoT growth introduces a new dimension of security vulnerabilities that dramatically escalates the nature and seriousness of cybercrime risks. In addition to traditional confidentiality cyber risks, IoT threats include attacks that can: • Render smart appliances useless • Shut down city power grids • Threaten lives through hacked pacemakers and other medical devices. Such security flaws not only endanger lives, frustrate customers, and disrupt business operations, but they create significant cost and public relations damage for IoT developers and manufacturers.
Tags : 
    
DigiCert
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Integration is the lifeblood of today’s digital economy, and middleware is the software layer connecting different applications, services, devices, data sources, and business entities. This Ovum Decision Matrix (ODM) is a comprehensive evaluation to help enterprise IT leaders, including chief information officers (CIOs), enterprise/integration architects, integration competency center (ICC)/integration center of excellence (CoE) directors, and digital transformation leaders select a middleware-as-aservice (MWaaS) suite best suited to their specific hybrid integration requirements. Download this whitepaper to read further on Hybrid integration suites for cloud service, API-led, B2B, and mobile application integration.
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: May 31, 2018
Reduced costs, increased subscribers and advertiser revenue
Tags : 
    
TIBCO Software APAC
Published By: Workday     Published Date: Mar 02, 2018
Cloud-based systems are the future for cities and counties looking to reduce budgets and use staff wisely. The cloud allows governments to end constant upgrades to legacy systems, improve security, and invest in operations—not capital expenses. Join the Governing Institute for an overview of the benefits of a migration to the cloud and gain valuable insights from the City of Rochester’s successful transition.
Tags : 
cloud-based systems, improve security
    
Workday
Published By: Workday     Published Date: Mar 02, 2018
Before Workday, Panera Bread’s payroll processes were manual, inefficient, and error-prone, and payroll nightmares and compliance risks were a regular occurrence. Complex systems and costly integrations made it impossible for the company to keep up with its rapid growth or gain valuable insights into global labor expenses. See the infographic to learn why unifying HR, payroll, time tracking, and absence management in a single system allows Panera to use one consistent, flexible, and scalable system across the U.S. and Canada.
Tags : 
panera bread, payroll, unifying
    
Workday
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee