data traffic

Results 1 - 25 of 113Sort Results By: Published Date | Title | Company Name

Sky Bet Success Story

Published By: Adobe     Published Date: Nov 07, 2013
Advanced management and tracking in Adobe Social helps Sky Bet drive revenue through timely delivery of targeted high-impact social campaigns.
Tags : 
adobe, skybet, success story, advanced management, adobe social, drive revenue, traditional digital marketing, drive new customers, content strategy, audience engagement, minimize cost, minimize complexity, social marketing initiatives, integrate data easily, effective customer bonds, streamline moderation, social properties, interaction data, gain traffic, social customer service
    
Adobe

PREDICTIVE VIDEO DELIVERY

Published By: Akamai     Published Date: Mar 08, 2017
Video leads mobile data traffic. Read this infographic to find out more facts about video and mobile data traffic.
Tags : 
video, mobile data traffic, mobile data, mobile video, infographic
    
Akamai

Predictive Content Delivery for Mobile Video

Published By: Akamai     Published Date: Mar 08, 2017
Akamai’s Predictive Content Delivery (PCD) technology was developed to help satisfy the growing demand of mobile video. It is designed to optimize the delivery of data-heavy video traffic terminating on mobile devices and provide mobile customers with a video service that exceeds their expectations in the form of high-quality, always-available video with instant startup. Read on to find out more.
Tags : 
content, predictive content delivery, pcd, video, traffic, mobile video
    
Akamai

Managing Bots in FS

Published By: Akamai Technologies     Published Date: Mar 09, 2017
For many financial institutions, traffic from bots (aggregators, scrapers, crawlers) can account for up to 40-60% of their overall website traffic — from good bots engaged in essential business tasks to bad bots performing harmful activities. Banks, traders, asset managers, and insurers might know how much of their traffic is from bots, but what they may not know is the impact those bots may be having on their business. Read the report to learn more about: • Managing Financial Data Aggregators • How Bots Affect the Digital Experience • What a good bot looks like?
Tags : 
financial services, financial data, bots, bot management, website traffic, the digital experience
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Zero Trust Delivers 6 Security and Business Benefits

Published By: Akamai Technologies     Published Date: Dec 17, 2018
Employees, devices, and applications are no longer locked away inside the corporate perimeter. They’re on the web and on the go. Providing security for a new breed of anytime, anywhere workers and cloud-based applications requires a novel approach: a zero trust security model. Assuming that every user, request, and server is untrusted until proven otherwise, a zero trust solution dynamically and continually assesses trust every time a user or device requests access to a resource. But zero trust offers more than a line of defense. The model’s security benefits deliver considerable business value, too. Read this white paper to learn more about: -Protecting your customers’ data -Decreasing the time to breach detection -Gaining visibility into your enterprise traffic -Reducing the complexity of your security stack -Solving the security skills shortage -Optimizing the end-user experience -Facilitating the move to the cloud
Tags : 
    
Akamai Technologies

Yahoo Japan Clos Fabric Network Infrasture Case Study

Published By: Apstra     Published Date: Aug 19, 2019
Yahoo Japan Corporation, one of Japan’s largest Internet service providers, is deploying Clos fabric networks for efficiently addressing their ever-growing data center traffic. Apstra® was selected for streamlining the design, build, and operations of these networks.
Tags : 
    
Apstra

Internet Failover with Bandwidth Aggregation for Disaster Recovery

Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom, bandwidth management, backup and recovery
    
Astrocom

Increase application security and availability with Imperva

Published By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
    
AWS

Cracking the Content Code

Published By: BrightEdge     Published Date: Nov 13, 2014
BrightEdge tapped into its massive Data Cube repository to provide a comprehensive view into the channels that drive traffic and the types of content that perform best. BrightEdge created this report to help brands understand the actual performance of site content by channel and by industry.
Tags : 
brightedge, content marketing, data analytics, marketing data, marketing platform, market intelligence, business intelligence, business analytics, marketing automation, data integration
    
BrightEdge

Global deduplication for encrypted data

Published By: Carbonite     Published Date: Apr 09, 2018
Global data deduplication provides important benefits over traditional deduplication processes because it removes redundant data through entire enterprises, not just single devices. Global deduplication increases the data deduplication ratio—the size of the original data measured against the size of the data store after redundancies are removed. This helps reduce the amount of storage required at a time when businesses face exponential storage growth. Chief benefits of global deduplication include: • Reductions in storage of up to 60% • The most optimal deduplication ratio • Enterprise-wide reach • Massive reductions in backup-related WAN traffic By shrinking storage capacity needs, data deduplication can cut storage costs quickly. At the same time, businesses today need to access and utilize their data in real time, making the most recent and relevant information available. By eliminating redundant data, deduplication technology makes it simpler for data to be managed across various b
Tags : 
    
Carbonite

Is Your R&E Network Ready for the Great Surge?

Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena

Campaign Landing Page

Published By: Cisco     Published Date: Jan 05, 2015
The four pillars of computing — cloud, mobility, social, and analytics — are driving new levels of network innovation in datacenter networks. These forces are now buffeting the datacenter along with virtualization and the Internet of Things (IoT), resulting in sweeping changes in traffic patterns that expose the limitations of traditional networks and their operational models. To become a resource rather than a bottleneck to overall datacenter performance, the network must deliver not just exceptional performance and scalability but also unprecedented automation and orchestration that can yield agility, flexibility, and service velocity. This Technology Spotlight examines these key trends and discusses the role that Cisco's Application Centric Infrastructure (ACI) plays in addressing these ongoing challenges for enterprise IT and network managers.
Tags : 
cloud computing, infrastructure, marketplace, application, hybrid, enterprise, it management, enterprise applications
    
Cisco

The 100G Challenge and Beyond

Published By: Cisco     Published Date: Jan 15, 2015
While this dramatic growth occurs, projections call for the cloud to account for nearly two-thirds of data center traffic and for cloud-based workloads to quadruple over traditional servers. That adds another element to the picture: changing traffic patterns. Under a cloud model, a university, for example, can build its network to handle average traffic volumes but then offload data on heavier trafficked days to a public cloud service when demand dictates, such as when it’s time to register for the next semester of classes.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco

Five Steps for Securing the Data Center

Published By: Cisco     Published Date: Apr 10, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
security, data center, performance, virtualization, application, internet, functionality, it management
    
Cisco

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
Cisco

IDC: Rethinking the Network as a Network Enforcer

Published By: Cisco     Published Date: Jul 11, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security.
Tags : 
    
Cisco

IDC - The New Need for Speed in the Datacenter Network

Published By: Cisco     Published Date: Jul 11, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco

Cisco Nexus Data Broker

Published By: Cisco     Published Date: Sep 07, 2016
This white paper discusses how the data broker along with Cisco Nexus 9000 Series Switches integrates with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.
Tags : 
    
Cisco

The New Need for Speed in the Datacenter Network

Published By: Cisco     Published Date: Dec 21, 2016
Today's datacenter networks must better adapt to and accommodate business-critical application workloads. Datacenters will have to increasingly adapt to virtualized workloads and to the ongoing enterprise transition to private and hybrid clouds. Pressure will mount on datacenters not only to provide increased bandwidth for 3rd Platform applications such as cloud and data analytics but also to deliver the agility and dynamism necessary to accommodate shifting traffic patterns (with more east-west traffic associated with server-to-server flows, as opposed to the traditional north-south traffic associated with client/server computing). Private cloud and legacy applications will also drive daunting bandwidth and connectivity requirements. This Technology Spotlight examines the increasing bandwidth requirements in enterprise datacenters, driven by both new and old application workloads, cloud and noncloud in nature. It also looks at how Cisco is meeting the bandwidth challenge posed by 3rd
Tags : 
    
Cisco

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.