bi application

Results 1 - 25 of 1896Sort Results By: Published Date | Title | Company Name

Are Bots Killing Your Business Intelligence?

Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd

Gain visibility over your automotive supply chain

Published By: HERE Technologies     Published Date: Sep 26, 2019
A utomobile manufacturers find meeting the requirements of a just - in - time supply chain one of their biggest challenges , but with advances in location technology manufacturers can meet even the strictest shipping deadlines . With better visibility across the supply chain auto manufacturers can drive down costs, improve efficiency and support proactive decision making. By reading this eBook, you’ll discover how to p repar e your supply chain for the future wit h the application of location intelligence to: ? Gain location - based insights to help optimize processes and inform decision making ? Set accurate ETAs with reliable real - time information ? Use real - time visibility to proactively solve problems ( like bottlenecks ) as they occur ? Gain comprehensive coverage of assets and trace them across factories, warehouses, showrooms and in transit
Tags : 
    
HERE Technologies

How a leading professional services firm enhanced collaboration with Cloud Security

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Global professional services firm, Arup, moved from Cisco Cloud Web Security (CWS) to Cisco Umbrella. By implementing a secure internet gateway in conjunction with next-gen endpoint security, Arup secured access to the internet wherever users go, reduced its exposure to malware and improved the ability to detect, respond and remediate when necessary. Impact: -Substantially reduced administrative time -Accelerated response and remediation process -Increased performance of cloud applications -Reduced time to investigate"
Tags : 
    
Cisco Umbrella EMEA

A single solution to govern, manage, and consume all shared data assets

Published By: TIBCO Software     Published Date: Jun 14, 2019
As recognized leader in master data management (MDM), and a pioneer in data asset management, TIBCO EBX™ software is an innovative, single solution for managing, governing, and consuming all your shared data assets. It includes all the enterprise class capabilities you need to create data management applications including user interfaces for authoring and data stewardship, workflow, hierarchy management, and data integration tools. And it provides an accurate, trusted view of business functions, insights, and decisions to empower better decisions and faster, smarter actions. Download this datasheet to learn: What makes EBX™ software unique Various capabilities of EBX software The data it manages
Tags : 
    
TIBCO Software

Overcoming Petabyte-Scale Storage Challenges for Big Data and Analytics

Published By: Infinidat EMEA     Published Date: May 14, 2019
Big Data and analytics workloads represent a new frontier for organizations. Data is being collected from sources that did not exist 10 years ago. Mobile phone data, machine-generated data, and website interaction data are all being collected and analyzed. In addition, as IT budgets are already under pressure, Big Data footprints are getting larger and posing a huge storage challenge. This paper provides information on the issues that Big Data applications pose for storage systems and how choosing the correct storage infrastructure can streamline and consolidate Big Data and analytics applications without breaking the bank.
Tags : 
    
Infinidat EMEA

Managing Data Storage at Scale for Competitive Advantage

Published By: Infinidat EMEA     Published Date: May 14, 2019
Even after decades of industry and technology advancements, there still is no universal, integrated storage solution that can reduce risk, enable profitability, eliminate complexity and seamlessly integrate into the way businesses operate and manage data at scale? To reach these goals, there are capabilities that are required to achieve the optimum results at the lowest cost. These capabilities include availability, reliability, performance, density, manageability and application ecosystem integration? This paper outlines a better way to think about storing data at scale—solving these problems not only today, but well into the future?
Tags : 
    
Infinidat EMEA

Evaluating Cloud-based Mobile Device Management

Published By: Virtela Communications, Inc.     Published Date: Oct 13, 2011
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
Tags : 
cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications
    
Virtela Communications, Inc.

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Perform

Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
Coyote Point Systems

Secure at the Source

Published By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009
Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.
Tags : 
source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing
    
Ounce Labs, an IBM Company

Magic Quadrant for Digital Commerce

Published By: Adobe     Published Date: Oct 08, 2019
Gartner evaluates eighteen digital commerce platforms and for the second year in a row, Gartner has identified Magento Commerce as an Industry Leader (top 3). According to Gartner, Leaders execute well against their current vision and are well-positioned for tomorrow. Magento Commerce, part of Adobe Experience Cloud, is innovating on platform functionality to help businesses like yours with the performance, scalability, and security required to deliver full-lifecycle customer experiences. Digital commerce platform choice has grown in complexity due to increased vendor choice and breadth of offerings, pricing model complexity and emerging managed service offerings. This report evaluates 18 vendors of digital commerce platforms to assist application leaders supporting digital commerce.
Tags : 
    
Adobe

ASG: Distinctively Positioned to Optimize Web Application Performance

Published By: ASG Software Solutions     Published Date: May 27, 2009
Application management requires visibility from multiple vantage points within the IT enterprise, combined with a centralized information store that pulls the technology pieces of the application puzzle into a coherent whole.
Tags : 
asg, cmdb, bsm, itil, configuration management, metadata, metacmdb, lob
    
ASG Software Solutions

Business-Critical Benefits of Workload Automation, by EMA

Published By: ASG Software Solutions     Published Date: Nov 05, 2009
Effective workload automation that provides complete management level visibility into real-time events impacting the delivery of IT services is needed by the data center more than ever before. The traditional job scheduling approach, with an uncoordinated set of tools that often requires reactive manual intervention to minimize service disruptions, is failing more than ever due to todays complex world of IT with its multiple platforms, applications and virtualized resources.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, workload automation, wla
    
ASG Software Solutions

Archiving and SAP Environments: For Business, IT, and Regulatory Requirements

Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions

Secrets to BSM Success: End-to-End Visibility and Customer Focus

Published By: ASG Software Solutions     Published Date: Feb 23, 2010
There are success stories of businesses that have implemented Business Service Management (BSM) with well-documented, bottom-line results. What do these organizations know that their discouraged counterparts don't?
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions

Analytics and Data Sources: Mere Connectivity is Just the Beginning

Published By: Gigaom     Published Date: Oct 24, 2019
A huge array of BI, analytics, data prep and machine learning platforms exist in the market, and each of those may have a variety of connectors to different databases, file systems and applications, both on-premises and in the cloud. But in today’s world of myriad data sources, simple connectivity is just table stakes. What’s essential is a data access strategy that accounts for the variety of data sources out there, including relational and NoSQL databases, file formats across storage systems — even enterprise SaaS applications — and can make them all consumable by tools and applications built for tabular data. In today’s data-driven business environment, fitting omni-structured data and disparate applications into a consistent data API makes comprehensive integration, and insights, achievable. Want to learn more and map out your data access strategy? Join us for this free 1-hour webinar from GigaOm Research. The webinar features GigaOm analyst Andrew Brust and special guests, Eric
Tags : 
    
Gigaom

SUSE Cloud Application Platform on Amazon EKS

Published By: AWS     Published Date: Oct 03, 2019
Christian Elsenhuber - AWS & Carsten Duch - SUSE Join our webinar and learn more about the SUSE Cloud Application Platform on Amazon Elastic Kubernetes Service (Amazon EKS). The webinar will show you how SUSE accelerates the use of applications in containers. With integrated automation and customization features, SUSE helps your DevOps teams deliver container applications, accelerate innovation, and improve the responsiveness of your IT.
Tags : 
    
AWS

Outcome-Driven Security from Armor Protects AWS Workloads

Published By: AWS     Published Date: Oct 07, 2019
Armor provides a managed Security-as-a-Service (SECaaS) solution that helps strengthen and unify your AWS, on-premises, and hybrid security to enable rapid detection, prevention, and response to cyberthreats in real time—typically with a lower TCO. Armor’s protection can be deployed quickly to help boost application availability. This can also play a role in increasing the visibility and overall security awareness across all your apps, no matter where they reside, because they are always operational. This solution also puts the tools—like a Web Application Firewall—in place to provide appropriate protection while being managed from a single pane of glass. Your organization can also continue using your existing security resources because Armor provides the integration to unify their offerings with the tools you already have in place. In addition, Armor’s Security Operation Center (SOC) is incorporated to reduce high threat dwell times (the amount of time a threat has undetected access t
Tags : 
    
AWS

Gain Rapid Threat Protection with Automated DDoS and WAF Solutions

Published By: AWS     Published Date: Oct 09, 2019
Organizations often struggle to protect business-critical applications from ever-increasing threats. Many organizations lack the security staff, and sometimes knowledge, to mitigate the seriousness—and scope—of the attacks they constantly face. APN Security Competency Partner Imperva provides automated security solutions that can help you defend against both known and zero-day attacks and increase visibility across your entire Amazon Web Services (AWS) environment, to rapidly stop attacks and quickly identify the real threats that need to be investigated. Join our upcoming webinar to learn how DigiCert has protected both their AWS and on-premises environments from DDoS attacks and other threats by using Imperva’s SaaS Web Application Security solution. This versatile security offering helps keep application workloads safe across cloud and on-premises environments and can be managed from a single pane of glass, enabling security teams to more effectively and efficiently secure business
Tags : 
    
AWS

Simplify and Accelerate Secure Application Deployments

Published By: AWS     Published Date: Oct 09, 2019
When determining the best way to protect their applications and data on Amazon Web Services (AWS), organizations are often challenged by the high total cost of ownership and threat dwell times found in other security solutions. Armor can help your organization overcome these barriers and increase awareness of what is being deployed, and where, so you can better control your security policies. Attend our upcoming webinar to see how Armor helps customers reduce their time to market, accelerate development timeline, and gain quick, secure application access.
Tags : 
    
AWS

End-to-End Security Visibility into Your Environments with Splunk and AWS

Published By: AWS     Published Date: Oct 09, 2019
Fulfilling the security and compliance obligations within the AWS Shared Responsibility Model is critical as organizations shift more of their infrastructure to the cloud. Most infrastructure and application monitoring solutions haven’t caught up to meet these new requirements, forcing IT and security teams to resort to traditional monitoring strategies that don’t allow for innovation and growth. Join us for this webinar to learn how Splunk and AWS give you end-to-end visibility across your applications and help quickly detect potential security threats. Find out how Experian leveraged Splunk Cloud to deliver log data in near real-time to their operations teams for analysis and monitoring, roll out new features/updates faster, create reusable features to deploy in multiple customer environments to scale with their business, and ensure adherence to security and compliance standards.
Tags : 
    
AWS

How Ancestry Manages Risk in Their Application Environments with Qualys on AWS

Published By: AWS     Published Date: Oct 09, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production e
Tags : 
    
AWS

Testing Mobile Applications

Published By: Harry lei     Published Date: Apr 04, 2011
An approach towards solving the emerging technological implications of Mobile Apps. MOBILE is Accelerating.
Tags : 
i phone applications testing, blackberry applications testing, android applications testing, agile, saas, i pad applications testing, software compliance
    
Harry lei

iPad in the Enterprise - A Security Perspective

Published By: Endeavour Software Technologies     Published Date: Nov 25, 2011
This whitepaper takes a deep dive into the security considerations required for enterprise mobile applications with an emphasis on iPad security.
Tags : 
    
Endeavour Software Technologies

Apply Usability Techniques To Incease Your Online Application Completion Rate by 20%

Published By: myStaffingPro     Published Date: Apr 19, 2012
Transform your career site into a user-friendly candidate experience with our complete Career Site Usability Guide.
Tags : 
    
myStaffingPro

ACI Anywhere

Published By: Cisco     Published Date: Mar 22, 2019
Cisco ACI, the industry-leading software-defined networking solution, facilitates application agility and data center automation. With ACI Anywhere, enable scalable multicloud networks with a consistent policy model, and gain the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability.
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.