web

Results 1 - 25 of 3975Sort Results By: Published Date | Title | Company Name
Published By: Syncsort     Published Date: Oct 30, 2018
In today’s digital business world, accurate address and geolocation data is invaluable. But, address capture is something that is often overlooked from a user and business perspective. Clean address capture can enhance user experience, not only while entering an address, but also during the entire customer journey. Download this eBook to learn how global address validation tools can help: • Simplify address capture on web-based forms • Accurately pinpoint customer locations • Improve efficiencies in shipping and logistics • Define sales and marketing territories and enrich address information
Tags : 
    
Syncsort
Published By: Couchbase     Published Date: Jul 15, 2013
NoSQL database technology is increasingly chosen as viable alternative to relational databases, particularly for interactive web applications. Developers accustomed to the RDBMS structure and data models need to change their approach when transitioning to NoSQL. Download this white paper to learn about the main challenges that motivates the need for NoSQL, the differences between relational databases and distributed document-oriented databases, the key steps to perform document modeling in NoSQL databases, and how to handle concurrency, scaling and multiple-place updates in a non-relational database.
Tags : 
white paper, database, nosql, couchbase
    
Couchbase
Published By: Couchbase     Published Date: Dec 04, 2014
Interactive applications have changed dramatically over the last 15 years. In the late ‘90s, large web companies emerged with dramatic increases in scale on many dimensions: · The number of concurrent users skyrocketed as applications increasingly became accessible · via the web (and later on mobile devices). · The amount of data collected and processed soared as it became easier and increasingly · valuable to capture all kinds of data. · The amount of unstructured or semi-structured data exploded and its use became integral · to the value and richness of applications. Dealing with these issues was more and more difficult using relational database technology. The key reason is that relational databases are essentially architected to run a single machine and use a rigid, schema-based approach to modeling data. Google, Amazon, Facebook, and LinkedIn were among the first companies to discover the serious limitations of relational database technology for supporting these new application requirements. Commercial alternatives didn’t exist, so they invented new data management approaches themselves. Their pioneering work generated tremendous interest because a growing number of companies faced similar problems. Open source NoSQL database projects formed to leverage the work of the pioneers, and commercial companies associated with these projects soon followed. Today, the use of NoSQL technology is rising rapidly among Internet companies and the enterprise. It’s increasingly considered a viable alternative to relational databases, especially as more organizations recognize that operating at scale is more effectively achieved running on clusters of standard, commodity servers, and a schema-less data model is often a better approach for handling the variety and type of data most often captured and processed today.
Tags : 
database, nosql, data, data management, white paper, why nosql, couchbase
    
Couchbase
Published By: MarkLogic     Published Date: Aug 04, 2014
The Age of Information and the associated growth of the World Wide Web has brought with it a new problem: how to actually make sense of all the information available. The overarching goal of the Semantic Web is to change that. Semantic Web technologies accomplish this goal by providing a universal framework to describe and link data so that it can be better understood and searched holistically, allowing both people and computers to see and discover relationships in the data. Today, organizations are leveraging the power of the Semantic Web to aggregate and link disparate data, improve search navigation, provide holistic search and discovery, dynamically publish content, and complete ETL processes faster. Read this white paper to gain insight into why Semantics is important, understand how Semantics works, and see examples of Semantics in practice.
Tags : 
data, data management, whitepaper, marklogic, semantic, semantic technology, nosql, database, semantic web, big data
    
MarkLogic
Published By: Cloudant - an IBM Company     Published Date: Aug 01, 2015
The database you pick for your next web or mobile application matters now more than ever. Today’s applications are expected to run non-stop and must efficiently manage continuously growing amounts of transactional and multi-structured data in order to do so. This has caused NoSQL to grow from a buzzword to a serious consideration for every database, from small shops to the enterprise. Read this whitepaper to learn why NoSQL databases have become such a popular option, explore the various types available, and assess whether you should consider implementing a NoSQL solution for your next application.
Tags : 
    
Cloudant - an IBM Company
Published By: Amazon Web Services     Published Date: Apr 04, 2016
Amazon DynamoDB is a fully managed, NoSQL database service. Many workloads implemented using a traditional Relational Database Management System (RDBMS) are good candidates for a NoSQL database such as DynamoDB. This whitepaper details the process for identifying these candidate workloads and planning and executing a migration to DynamoDB.
Tags : 
    
Amazon Web Services
Published By: Semantic Web Company     Published Date: Jun 27, 2018
Get a comprehensive introduction to AI technologies and learn why semantics should be a fundamental element of any AI strategy. Semantic enhanced artificial intelligence (Semantic AI) is based on the fusion of semantic technologies and machine learning. In this white paper, you will understand how to align the work of data scientists and subject matter experts to increase the business value of your data lake.
Tags : 
    
Semantic Web Company
Published By: Couchbase     Published Date: Jan 28, 2013
Interactive software has changed in fundamental ways over the last 35 years. But until recently, database technology has not advanced to keep pace. The “online” systems of the 1970s have evolved into today’s web and mobile applications.
Tags : 
big data, white paper, analytics, data management
    
Couchbase
Published By: Couchbase     Published Date: Jan 29, 2013
Interactive software has changed in fundamental ways over the last 35 years. But until recently, database technology has not advanced to keep pace. The “online” systems of the 1970s have evolved into today’s web and mobile applications.
Tags : 
data management
    
Couchbase
Published By: MarkLogic     Published Date: Jun 16, 2013
The primary issue discussed within this paper boils down to two disparate database reliability models: ACID vs BASE. The first (ACID) has been around for some 30+ years, is a proven industry standard for SQL-centric and other relational databases, and works remarkably well in the older, yet still extant, world of vertical scaling. The second (BASE) has only recently gained popularity over the past 10 years or so, especially with the rise of social networking, Big Data, NoSQL, and other leviathans in the new world of Data Management. BASE requirements rose out of a need for ever-expanding horizontally scaled distributed networks, with non-relational data stores, and the real-time availability constraints of web-based transaction processing. While there are now more crossovers and negotiations between the two models, they essentially represent two competing groups, with Brewer’s CAP Theorem acting as the referee in the middle forcing tough decisions on each team.
Tags : 
data, data management, unstructured data, nosql, database, acid, base, database transactioning
    
MarkLogic
Published By: Couchbase     Published Date: Jan 24, 2013
Interactive software has changed in fundamental ways over the last 35 years. But until recently, database technology has not advanced to keep pace. The “online” systems of the 1970s have evolved into today’s web and mobile applications.
Tags : 
white paper, nosql, database, data, data managemet, couchbase, dataversity, data management
    
Couchbase
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
Independent technology research firm Forrester evaluated web application firewall (WAF) vendors and published the results in The Forrester Wave™: Web Application Firewalls, Q2 2018. Akamai Technologies emerged as one of the leaders after a comprehensive evaluation on 33 criteria. The report states that security pros require a WAF that will automatically protect web applications, stay ahead of zero-day attacks and protect new application formats including APIs and serverless architectures. The report also reveals detailed findings for the 10 most significant WAF vendors. Akamai’s Kona Site Defender was the top scorer in the zero-day attacks criterion and one of the select vendors rated a Leader, the highest-ranking level in the report.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Customer relationships begin with trust. When customers entrust your organization with their sensitive financial and personal information, not only do they expect you to keep it safe, but they also demand the same fast, convenient online experiences they’ve become accustomed to over web and mobile devices. This new e-book provides guidance on how financial institutions can meet and exceed these expectations, while also reaping bottom-line rewards, by mastering security, trust, and digital experience. You’ll learn about: - What makes your new millennial customers tick - How to stay competitive in a rapidly evolving digital market - Real-world takeaways and success stories"
Tags : 
    
Akamai Technologies
Published By: Workday UK     Published Date: Sep 18, 2018
In this Argyle Executive Forum webinar replay, leading HR executives across industries provide expert insight and recommendations for building an analytics strategy and putting a data foundation in place.
Tags : 
    
Workday UK
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Lookout     Published Date: Dec 13, 2018
Mobile security is making the role of today’s CISO more complicated than ever. Watch the webinar for a discussion of current threats, a review of mobile security solutions, and best practices for adoption and implementation.
Tags : 
    
Lookout
Published By: Turbonomic     Published Date: Nov 27, 2018
Want to learn how to design and deploy infrastructure-as-a-service (IaaS) solutions in the cloud using Amazon Web Services? This ebook will take you through practical examples, design patterns, and tips to help you confidently build a working IaaS solution. Download to find out: The key components of the AWS public cloud platform How to launch your compute and storage resources on the AWS Virtual Private Cloud (VPC) platform How to add compute resources to your VPC with AWS Elastic Compute Cloud (EC2) The types of storage in AWS Elastic Block Storage (EBS) with cost, performance impact, and examples of operational tasks By the end of this ebook, you’ll master AWS core components and how to design for resiliency. You’ll even be able to launch and manage your cloud solution using either the AWS command-line interface or the AWS web console.
Tags : 
    
Turbonomic
Published By: Applause Israel     Published Date: Sep 25, 2018
In the midst of an overwhelming amount of disruption taking place in the retail banking industry, a clear path to success has emerged. Banks that want to continue to gain and retain loyal customers must make it easier to bank with them. According to a survey that included 760 different banks and credit unions, the most important priority for 2017 and beyond is the removal of friction from the customer journey.1 To clarify, today’s customer journey includes both the customer experience at local branch locations as well as their experience while interacting with websites, mobile apps, smart watches, and anything else that is connected to the Internet. The battleground for customers has shifted to the digital world, and retail banks must adapt quickly as crafty Fintech startups and tech giants like Amazon, Apple, and Google continue to push the limits of what is possible with technology. If digital channels aren’t approached correctly, they can add complexity to the customer experience in
Tags : 
    
Applause Israel
Published By: Applause Israel     Published Date: Sep 25, 2018
The goal of usability testing, simply put, is to make sure that a user can complete the tasks they are expected to complete. Usability testing doesn’t test whether or not the functions of the application, website or connected device work correctly, but rather that a user intuitively understands how to perform these tasks — and how easy or difficult it was to do so. With usability testing, “close enough” won’t cut it. A product may have a superior architecture, a great set of features, good performance, scalability and a number of other positive attributes. However, all of this effort is wasted if the user experience is inadequate. An application, website or connected device that is not user-friendly is just as bad as a buggy version and can lead to diminished revenue, product abandonment or a total failure. An application with poor usability can also negatively affect a brand
Tags : 
    
Applause Israel
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.