akamai

Results 226 - 250 of 299Sort Results By: Published Date | Title | Company Name
Published By: Akamai     Published Date: Mar 08, 2017
Akamai’s Predictive Content Delivery (PCD) technology was developed to help satisfy the growing demand of mobile video. It is designed to optimize the delivery of data-heavy video traffic terminating on mobile devices and provide mobile customers with a video service that exceeds their expectations in the form of high-quality, always-available video with instant startup. Read on to find out more.
Tags : 
content, predictive content delivery, pcd, video, traffic, mobile video
    
Akamai
Published By: Akamai     Published Date: Jun 14, 2010
Looking back to the first iterations of travel Web sites, we can appreciate just how far technology has come. As advancements like high-speed connections began to replace the now archaic dial-up experience, consumers adjusted their expectations and demands of the companies they patronized. To gain a deeper understanding of the status of travelers' current online expectations, Akamai commissioned PhoCusWright to conduct a study examining key elements of the online consumer experience.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load, abandonment
    
Akamai
Published By: Akamai     Published Date: Jul 22, 2010
This slide version of a recorded event delivers key findings of an in-depth consumer survey studying travel Web site functionality and conversion rate satisfaction. Host Margaret Rivera of Akamai and presenter Caroll Rheem, Director of Research at PhoCus Wright, define best practices for fast, reliable travel Web sites.
Tags : 
akamai, travel, site performance, phocuswright, customer experience, usability, travel ecommerce, web load, abandonment
    
Akamai
Published By: Akamai     Published Date: Jul 06, 2010
Founded in the Queensland outback in 1920, Qantas Airways is the world's longest continuously operating airline. Today it is widely regarded as the world's leading long-distance airline and one of the strongest brands in Australia, responsible for an estimated $1.7 billion in revenue for the fiscal year 2009/2010. The airline is committed to continually improving the experience on its website, qantas.com, whether enabling travelers to book all parts of a holiday or to self-manage their travel experiences. Since the site was first launched in 1996, it has evolved into the airline's primary customer contact channel.
Tags : 
qantas, case study, site performance, clicks, travel, e-commerce, ecommerce, uptime, reach
    
Akamai
Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
Learn how to overcome common challenges in the automotive industry seen in web-based application delivery.
Tags : 
automotive industry, akamai technology, globalization, internet, digital
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
This quick read highlights the top five realities and challenges faced by global manufacturers.
Tags : 
manufacturing, akamai technology, collaboration, best practices, electronics, business technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
Read this paper to learn how to overcome common challenges seen in web-based application delivery.
Tags : 
internet, digital manufacturer, akamai technology, best practices, tips
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
What digital trends are forcing CDN services to evolve? CDN services are changing, and web and application delivery professionals are navigating the evolving CDN landscape. Read the Forrester Research Report, "CDNs Extend to Web Performance Optimization and End-To-End Cloud Services" to learn what new capabilities are required from the Next Generation CDN.
Tags : 
cdns, akamai technology, web performance optimization, cloud services
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 10, 2016
Find out why companies must rethink how they architect their enterprise network and utilize the Internet to meet the demands of the business.
Tags : 
akamai technology, enterprise network, enterprise applications, business technology
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Many industry experts advise automotive companies to embrace digital transformation. At the heart of that mandate is the need to satisfy rising customer expectations for fast, secure, always-on services delivered seamlessly across all channels and devices. Read the seven top considerations as you embrace digital transformation.
Tags : 
automotive, digital transformation, customer relations, best practices, industry optimization
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Cybercriminals continue to evolve their tactics with ever-growing cyberattack sizes and new attack methods, which has spiked a demand for DDoS mitigation services. However, it is often difficult for companies to assess, evaluate, and differentiate DDoS mitigation service providers from one another. Read the four critical criteria you should use to evaluate providers before selecting one.
Tags : 
web security, best practices, mitigation services, network management, automotive, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services, enterprise applications
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology, cloud services, security
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention, best practices
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 15, 2016
The globalization of the medical device industry has delivered substantial business benefits, but it has also presented certain problems that can make the realization of those opportunities challenging. Learn about a comprehensive global collaboration solution that addresses and overcomes these obstacles.
Tags : 
medical device industry, global network, employee management, best practices, internet performance, internet security
    
Akamai Technologies
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Credential stuffing is on the rise. Bots are getting smarter and malicious actors are getting more confident. Unfortunately, these advanced cyberattacks are also becoming more difficult to detect with standard security controls. Learn more about credential stuffing and how you can protect your business, your brand, and your customers from bots that commit fraudulent activity.
Tags : 
credential, bots, business, risk, management, security, cyberattacks
    
Akamai Technologies Australia
Published By: Akamai Technologies Australia     Published Date: Feb 08, 2018
Websites provide online businesses with an unprecedented level of contact with customers and end users. However, they also place business information where it can be easily accessed by third parties – often using automated tools known as “bots”. For many organizations, bots represent up to 50% or more of their overall website traffic, from good bots engaged in essential business tasks to bad bots conducting fraudulent activities. Regardless of business impact, bot traffic can reduce website performance for legitimate users and increase IT costs. Organizations need a flexible framework to better manage their interaction with different categories of bots and the impact that bots have on their business and IT infrastructure.
Tags : 
control, visibility, customer, financial risk, web fraud, bots, infrastructure
    
Akamai Technologies Australia
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Today’s globally distributed and diverse workforce needs flexible yet straightforward access to the corporate network, regardless of user location, device type, employee affiliation, and application location (on-premises, SaaS, IaaS). Expedience and fluidity can’t come at the cost of security, especially given the realities of modern cybercrime. Learn more about the five demands you should make of an updated comprehensive application access solution.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Mar 07, 2019
Traditional remote access technologies—like VPNs, proxies,and remote desktops—provide access in much the same way they did 20 years ago. However, new and growing business realities—like a growing mobile and distributed workforce—are forcing enterprises to take a different approach to address the complexity and security challenges that traditional access technologies present. Read this whitepaper to learn 5 key reasons why it’s time for enterprises to adopt a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access technologies were created twenty-years ago, before businesses were distributed, mobile, and users of cloud. View this slideshare to learn 3 reasons why now is the time for a new remote access model.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Traditional remote access solutions were designed for business models of twenty years ago, but today they are distributed, mobile, and have many remote and third-party users. Read this paper to learn about a fundamentally new way to provide simple, secure remote access.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Read this white paper to learn how the rapid rise of remote and third-party users has created increased complexities for IT around network security and user expectations.
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 27, 2017
Most companies enable workers to work remotely, and when users are remote, they expect instant secure access to the business applications they need, on the device of their choice. View the Rise of the Remote Worker infographic to better understand the challenges IT departments face around management and security of remote workers.
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.