api

Results 1 - 25 of 2272Sort Results By: Published Date | Title | Company Name
Published By: Chatsworth     Published Date: May 10, 2016
The modern data center has changed. There are new demands around cloud computing, big data and infrastructure efficiency. This change in the data center is being driven by more users, more data and a lot more reliance on the data center itself. With private cloud technologies and the rapid growth in data leading the way within many technological categories (the Internet of Things), working with the right data center optimization technologies has never been more important. In this white paper, we explore new concepts around data center demand, where energy efficiency and cooling optimization fit in and modern best practices around your data center.
Tags : 
chatsworth, data center optimization
    
Chatsworth
Published By: FORTRUST     Published Date: Aug 12, 2015
Data Center Infrastructure Management (DCIM) has become more vital than ever to data center operations as efficiency and technology advancement cycles move at an increasingly rapid pace. The insight provided by these essential systems has historically only been accessible to the data center operations team, not the end user or for that matter – the colocated customer. Now that the technology sector as a whole is becoming increasingly user friendly, transparent and hands on, it makes sense for colocation data centers to offer a higher level of insight and transparency into their clients’ individual environments.
Tags : 
    
FORTRUST
Published By: RagingWire Data Centers     Published Date: Nov 03, 2015
This whitepaper examines some of the short- and long-term issues and challenges that should be part of your due diligence when facing growing demands of your organization’s evolving computing architecture and making major strategic and economic decisions. It also provides guidelines for evaluating the alternative choices, such as co-location and hosted service providers, as well as cloud services, which can all be utilized together for enhanced flexibility.
Tags : 
    
RagingWire Data Centers
Published By: Akamai Technologies     Published Date: Jun 14, 2018
IT complexity has rapidly grown with more applications, users, and infrastructure needed to service the enterprise. Traditional remote access models weren’t built for business models of today and are unable to keep up with the pace of change. Read this paper to understand how remote access can be redefined to remove the complexity, meet end-user expectation and mitigate network security risks.
Tags : 
security, multi-factor authentication, network security risks
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Apr 25, 2018
Cyber attackers are targeting the application programming interfaces (APIs) used by businesses to share data with customers. Consumer mobile adoption, electronic goods and services, and high volumes of data have led businesses to use APIs for data exchange. Unfortunately, attackers can also use APIs to access or deny service to valuable data and systems. This white paper explores strategies for protecting APIs. You’ll learn about APIs, how and why these endpoints are targets for web application attacks, security models, and how Akamai can help.
Tags : 
api, security, interface, businesses, data, mobile, adoption
    
Akamai Technologies
Published By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : 
devops, dev sec ops, infosec, container security, idg, digital transformation
    
Tenable
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
The popularity of integration platform as a service (iPaaS) started with business users looking to gain control and share data among their proliferating SaaS apps?without needing IT intervention. iPaaS was then adopted by IT to support business users to ensure security measures were being maintained and to provide more of a self-service environment. Now, iPaaS has evolved from a niche solution to taking a much bigger role: Read this whitepaper to learn about: Drivers for cloud integration Five emerging uses cases for iPaaS that enable better responsiveness, APIs, event-driven capabilities, human workflows, and data analysis Questions to ask when evaluating your current solution
Tags : 
    
TIBCO Software APAC
Published By: TIBCO Software APAC     Published Date: Aug 13, 2018
Maintaining a competitive edge today means building a Digital Enterprise capable of taking full advantage of social, mobile, web, cloud, “things,” (sensors and devices), and analytics technologies. Among the terms used to describe this business transition is “the API Economy,” an economy in which APIs are no longer just an IT concern, but the underpinnings of new revenue streams and new business models that are disrupting entire industries. Read this paper to learn about: New, modern applications being built for the enterprise Application ecosystems and extending the value of your company in the API Economy Two ways to integrate devices in the Internet of Things The microservices approach to application development The role of API management in the digital enterprise
Tags : 
    
TIBCO Software APAC
Published By: Lookout     Published Date: Mar 28, 2018
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
    
Lookout
Published By: KPMG     Published Date: Jul 10, 2018
Alliances are becoming a key part of corporate strategy for organisations seeking to keep abreast of disruptive technologies. Is this the right route for your organisation – and how can you maximise the chances of success? Download this report to find out: • how alliances are reshaping industries worldwide • whether strategic alliances are a viable alternative to M&A • the factors that can make or break an alliance • three priorities for making an alliance work.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 11, 2018
Looking for a smarter approach to workforce planning? With robotics and artificial intelligence transforming the workplace, analysing supply and demand over 3–5 years doesn’t make sense. HR leaders need to find a more flexible approach to workforce shaping. Read this report to discover: • the key trends that will shape the future workforce • what early movers into intelligent automation can teach us • what’s involved in agile workforce shaping • how to use our 5C Framework to navigate the changes ahead.
Tags : 
    
KPMG
Published By: KPMG     Published Date: Jul 18, 2018
Cloud services bring new and significant cybersecurity threats. The cloud can be secured—but not by the vendor alone. Are you clear about the risks and your responsibilities as an IT leader? Read this report to understand: • how cloud adoption is reshaping the threat landscape • why identity and access management must be a priority • what are cybersecurity best practices in a modern IT environment • which emerging technologies offer hope for improving cybersecurity outcomes. Download the report now:
Tags : 
    
KPMG
Published By: IBM     Published Date: Jul 05, 2018
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
IBM
Published By: IBM     Published Date: Aug 09, 2018
Forrester analyzed the Total Economic Impact of IBM API Connect and the benefits and costs that resulted.
Tags : 
    
IBM
Published By: Menlo Security     Published Date: Jun 01, 2018
"Financial services institutions are high-value targets for cyberattacks because of the capital they control, the personal information on customers they maintain, and the fear an attack on a bank generates in the public. Phishing attacks on FSIs have risen steadily, especially employee credential theft - because once an employee’s credentials are stolen, cyberattackers can access customer information, employee data, even finances. While legacy security solutions claim to block up to 99.9 percent of cyberattacks, all it takes is one employee or contractor to open an email from an unknown source, download a file from a compromised website, or in any other way fall victim to a cyberattack. So, it’s time for a new approach: Isolation, also known as, remote browsing. Download this Financial Services Best Practices Guide to Isolation to learn how to best eliminate phishing attacks and web malware. "
Tags : 
    
Menlo Security
Published By: Workday     Published Date: Aug 07, 2018
This e-book features 10 must-read articles on the rapidly evolving world of supply chain published by Becker’s Hospital Review. Articles cover a range of topics, from new entrants pushing into healthcare to how new business collaboratives are shaking up conventional distribution models.
Tags : 
    
Workday
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Oggi la tecnologia digitale è ovunque: cloud, mobility, social network e Internet of Things stanno cambiando il modo in cui tutti noi lavoriamo e ci divertiamo. Questo mondo digitale in rapida evoluzione sta anche rimodellando il rapporto tra le aziende e i clienti, che ora si aspettano dai propri brand preferiti un'esperienza utile e interattiva. Anche la sicurezza è motivo di preoccupazione. Azienda e clienti si scambiano un volume in continuo aumento di dati sensibili, aumentando i fattori di rischio.La trasformazione del mercato sta inoltre intensificando la concorrenza. Come osserva l'analista Mark Raskino, "Come conseguenza, tutti i contendenti hanno rielaborato le proprie strategie e si sono risvegliate alla potenza del business digitale nello stesso momento. Il conflitto è quindi inevitabile.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
La crescita aziendale è una priorità costante. In parallelo all’espansione dell’economia delle applicazioni, è probabile che stiate considerando iniziative di business digitale. Tra gli obiettivi più promettenti di una simile strategia:• Fornire esperienze digitali di qualità superiore ai consumatori attraverso il mobile • Ampliare mercati e flussi di ricavi attraverso canali multipli• Collegare dipendenti e partner ai dati aziendali, sempre e ovunque • Avviare nuovi servizi innovativi nel contesto dell'Internet of Things (IoT)La corretta esecuzione di una strategia digitale richiede la capacità di lanciare nuove applicazioni e coordinare la vostra presenza digitale con i partner. Le API (Application Programming Interface) generano la connettività necessaria per condividere i dati aziendali e i contenuti digitali con quelle applicazioni e con quei partner, tramite Internet. Le API sono una componente essenziale del business digitale: mettono gli sviluppatori in condizione di crear
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
L'avvento delle API (interfacce di programmazione delle applicazioni) rappresenta al contempo un'opportunità di business e una sfida tecnologica. Per i leader di business, le API sono un'occasione per generare nuovi flussi di ricavi e massimizzare il valore offerto ai clienti. Ricade però sugli architetti aziendali la responsabilità di creare API che consentano di riutilizzare i sistemi backend in nuove applicazioni web e mobile.È fondamentale che tutti gli stakeholder comprendano la stretta correlazione tra gli obiettivi aziendali e le sfide tecniche di un programma API. Spetta ai manager del programma la responsabilità di comunicare con chiarezza gli obiettivi di business primari delle API proposte agli architetti che poi realizzeranno materialmente l'interfaccia. Gli architetti devono invece focalizzarsi su tali obiettivi durante le fasi di implementazione dell'infrastruttura API e di progettazione dell'interfaccia stessa. Tutte le decisioni tecniche devono contribuire alla creazion
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nell'economia digitale, le API (Application Programming Interfaces) sono essenziali per concretizzare rapidamente le idee e approfittare delle nuove opportunità di business. Rappresentano la chiave per la digital transformation, consentendo alle aziende di offrire una customer experience eccezionale, creare nuovi flussi di ricavi e permettere a dipendenti, partner, app e device di accedere ai dati ovunque e in qualsiasi momento.Le API non sono necessariamente una nuova tecnologia, ma nel mondo digitale di oggi hanno assunto una particolare rilevanza in ogni aspetto del business. Questo ha accresciuto l'esigenza di implementare una soluzione di API Management realmente efficace. Ma quali sono le caratteristiche di una soluzione efficace?
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 23, 2018
Nel suo libro Psicologia della scienza, pubblicato nel 1966, lo psicologo americano Abraham Maslow analizzò la teoria secondo cui coloro che operavano in ambito psicologico necessitavano di un approccio alla cura da più punti di vista per favorire la genesi di nuove idee, senza limitarsi a utilizzare le stesse teorie e le medesime tecniche create da Freud e dai suoi seguaci in un passato ormai remoto. Partendo dal presupposto che può risultare difficile cambiare il proprio punto di vista, Maslow scrisse: "[...] La tentazione, se l'unico strumento che hai è un martello, è di trattare tutti i problemi come se fossero chiodi". Abbiamo fatto tutti questa esperienza. Siamo talmente abituati a fare le cose come si facevano in passato che a volte non ci chiediamo neppure più il motivo per cui continuiamo a farle oggi.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
En su libro publicado en 1966, “The Psychology of Science”, el psicólogo norteamericano Abraham Maslow abordó la idea de que los profesionales de la psicología necesitaban acometer sus métodos de tratamiento desde diferentes perspectivas para poder contar con ideas nuevas y no simplemente seguir usando las mismas teorías y técnicas creadas por Freud y sus seguidores tantos años atrás. Consciente de la posible dificultad de cambiar de punto de vista, Maslow escribió: “Si la única herramienta de la que se dispone es un martillo, es tentador abordarlo todo como si de un clavo se tratara”. Todos nosotros hemos vivido esta experiencia. Nos acostumbramos tanto a la manera en la que se han ido haciendo las cosas que a veces no nos cuestionamos las razones para seguir haciéndolo así.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: May 24, 2018
El crecimiento de su empresa es una prioridad continua. Además, a medida que la economía de las aplicaciones sigue creciendo, es probable que busque iniciativas de negocio digital para fomentar gran parte de dicho crecimiento. Algunos de los objetivos más prometedores de dicha estrategia son los siguientes: • Ofrecimiento de experiencias digitales superiores para consumidores a través de dispositivos móviles • Expansión de los flujos de mercados e ingresos a través de varios canales• Conexión de empleados y partners con los datos de la empresa en cualquier lugar y en todo momento • Lanzamiento de servicios nuevos innovadores en el Internet de las cosas (IoT)
Tags : 
    
CA Technologies EMEA
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com