CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

web app

Results 151 - 175 of 975Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications, web application security, networking, security, knowledge management, enterprise applications, business technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity, ddos, analytics, networking, knowledge management, enterprise applications, business technology
    
Akamai Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Across industry sectors, the boundaries of the traditional enterprise are blurring, as organizations open up their on-premise data and application functionality to partner organizations, the Web, mobile apps, smart devices and the cloud. APIs (application programming interfaces) form the foundation of this new open enterprise, allowing enterprises to reuse their existing information assets across organizational boundaries.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
APIs are an emerging technology for integrating applications using web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think we can secure APIs using the same methods and technology that we used to secure the conventional, browser-centric web. While it is true that APIs share many of the same threats that plague the web, they are fundamentally differently and have an entirely unique risk profile that you need to manage. This eBooklet provides an overview of these new risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The application programming interface (API) is an emerging technology for integrating applications using Web technology. This approach is exploding in popularity because it builds on well-understood techniques and leverages some existing infrastructure. But it is a mistake to think you can secure APIs using the same methods and technology with which we secured the browser-centric Web. APIs are fundamentally different from websites and have an entirely unique risk profile that must be addressed.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The rise of the application programming interface (API) represents a business opportunity and a technical challenge. For business leaders, APIs present the opportunity to open new revenue streams and maximize customer value. But enterprise architects are the ones charged with creating the APIs that make backend systems available for reuse in new Web and mobile apps.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Der Aufstieg der Anwendungsprogrammierschnittstelle (Application Programming Interface, API) stellt eine geschäftliche Chance und eine technische Herausforderung dar. Unternehmensverantwortlichen bieten APIs die Gelegenheit, sich neue Umsatzquellen zu erschließen und den Kundenwert zu maximieren. Es ist jedoch Aufgabe von Unternehmensarchitekten, die APIs zu erstellen, mit denen Back End?Systeme zur Wiederverwendung in neuen Webanwendungen und neuen mobilen Apps verfügbar werden.
Tags : 
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Sep 30, 2018
If you’re relying on manual processes for testing applications, artificial and automated intelligence (AI) and machine learning (ML) can help you build more efficient continuous frameworks for quality delivery. In this on-demand webinar, “Continuous Intelligent Testing: Applying AI and ML to Your Testing Practices,” you’ll learn how to: Use AI and ML as the new, necessary approach for testing intelligent applications. Strategically apply AI and ML to your testing practices. Identify the tangible benefits of continuous intelligent testing. Reduce risk while driving test efficiency and improvement. This webinar offers practical steps to applying AI and ML to your app testing. The speaker, Jeff Scheaffer, is senior vice president and general manager of the Continuous Delivery Business Unit at CA Technologies. His specialties include DevOps, Mobility, Software as a Service (SaaS) and Continuous Delivery (CDCI).
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 10, 2018
Companies struggle to find the right test data when testing applications which leads to bottlenecks, defects and constant delays. There is a better way and we want to show you how: Join us for this webcast to learn: - How Test Data Manager finds, builds, protects and delivers test data fast! - How to get your testing teams moving towards self sufficiency with test data Get your questions answered. Come away happy! Recorded Aug 20 2018 60 mins Presented by Prashant Pandey, CA Technologies
Tags : 
continuous delivery, application delivery, testing, test data management
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
SDx Central host a webcast to look at troubleshooting top-down application performance in Cisco SDWAN networks as well as assessing impact to application bottoms-up in a Cisco ACI data Center. Featuring: Jeremy Rossbach, Sr. Product Marketing Manager, CA Technologies Jason Normandin, Sr Principal Manager, CA Technologies Jessica Lyons Hardcastle, Senior Editor, SDx Central
Tags : 
    
CA Technologies EMEA
Published By: Dyn     Published Date: Oct 04, 2016
With nearly 80% of businesses experiencing four or more disruptions to their site each month, Aberdeen Group recently conducted a study to get to the root of today's internet performance challenges. Read the findings and discover how companies: Improve resolution times resulting from web outages - 65% of companies experience an hour or more to repair an internet related outage Increase customer satisfaction by 30% - A consistent, reliable and fast web experience is your key to happy, loyal customers Protect revenue - 60% of businesses record a minute of downtime resulting in a $1,000 loss in revenue Are your online services and sites built for resiliency or destined for the headlines? Get the report to find out how leading organizations are bucking the stats and implementing Internet Performance Management (IPM ) tools to boost time to resolution and improve site performance.
Tags : 
performance management, website, internet, dns
    
Dyn
Published By: Dyn     Published Date: Nov 03, 2016
The more you invest in an internet hybrid infrastructure, the more exposed you can be to internet events. At the internet infrastructure layer, this can mean unavailable destinations, poor performing paths and security events such as DDoS attacks. The fact is that there are thousands of internet events that happen every day and when it comes to DDoS attacks 97% of them happen at the infrastructure layer. You shouldn't rely on a single DNS service to protect you from all of these potential problems. Just like everything else in your IT architecture you should always have a backup plan. How you implement a redundant DNS architecture is not a given. Watch this informative webinar and learn about different ways you can get the benefits of a hardened internet infrastructure layer that fits your existing and planned online architecture. Get insights and examples from our DNS experts on different key approaches.
Tags : 
dyn, dns, hybrid infrastructure, networking, enterprise applications, business technology
    
Dyn
Published By: IBM     Published Date: May 17, 2016
Join the webcast to learn how you can simplify and automate your app environment deployment, and watch a brief demo on how this is put into practice in your organization.
Tags : 
ibm, middleware, apps, applications, hybrid, cloud, cloud computing
    
IBM
Published By: IBM     Published Date: Jan 27, 2017
Download this webcast to discover general applicability for public vs. private cloud, and whether a managed service is right for you.
Tags : 
    
IBM
Published By: Qualys     Published Date: Jul 20, 2012
Welcome to Web Application Security For Dummies! Web applications have become the Achilles heel of IT security. Web application vulnerabilities are now the most prevalent at more than 55 per cent of all server vulnerability disclosures. This figure doesn't include vulnerabilities in custom-developed web applications, so it may be just the tip of the iceberg. This book is all about understanding how to quickly find and fix vulnerabilities in web applications. The goal is to prevent attackers from gaining control over the application and obtaining easy access to the server, database, and other back-end IT resources.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, web application, application security, internet security, security management, web service security, business technology, research
    
Qualys
Published By: New Relic     Published Date: Apr 07, 2015
Are you an AWS user looking to accelerate time to market? Lower costs? Or avoid painful mistakes as you migrate your applications to the Cloud? Whether you’ve already moved to the Cloud or are getting ready to migrate, New Relic helps Amazon Web Services (AWS) users improve the performance and end-user experience of their applications.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
Whether you've already moved to the cloud or are ready to migrate, New Relic helps Amazon Web Services (AWS) users improve performance. Drawing on our deep cloud expertise and best practices we can offer to successfully migrate, operate, and optimize your cloud-hosted applications.
Tags : 
    
New Relic
Published By: New Relic     Published Date: Apr 07, 2015
Whether you've already moved to the cloud or are ready to migrate, New Relic helps Amazon Web Services (AWS) users improve performance. Drawing on our deep cloud expertise and best practices we can offer to successfully migrate, operate, and optimize your cloud-hosted applications.
Tags : 
    
New Relic
Published By: Optimizely     Published Date: Apr 06, 2018
The Need When building websites and applications, too many companies make decisions- on everything from new product features, to look and feel, to marketing campaigns- using subjective opinions rather than hard data. The Solution Companies should conduct online controlled experiments to evaluate their ideas. Potential improvements should be rigorously tested, because large investments can fail to deliver, and some tiny changes can be surprisingly detrimental while have big payoffs.
Tags : 
    
Optimizely
Published By: AppDynamics     Published Date: Sep 20, 2017
Larger organizations run into problems when monolithic architectures cannot be scaled, upgraded or maintained easily as they grow over time. Microservices architecture is an answer to that problem. It is a software architecture where complex tasks are broken down into small processes that operate independently and communicate through language-agnostic APIs.
Tags : 
mobile devices, web apps, operating systems, ram, server utilization, multi-core services, ethernet
    
AppDynamics
Published By: CA Mainframe     Published Date: Sep 12, 2008
This White Paper discusses end-to-end application performance management in the context of the impact to the business. It then highlights CA’s application quality and performance manage­ment solutions for both Web and mainframe applications, with particular focus on the integration of CA Wily with AQM Solutions’ TRILOGexpert APCTM for TriTuneTM with Performance Desktop.  It concludes with the Enterprise Management Associates (EMA) perspective on the market in general, and on the CA solution in particular.
Tags : 
ca mainframe, application performace management, quality management, application quality, mainframe
    
CA Mainframe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search