IT Management  >   Systems Operations  >  

Applications Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Application Availability, Software Applications Management, Software Management, Application Management, Software Application Management, Software Distribution
DEFINITION: The management of the performance and monitors the availability of network applications, such as e-mail, intranets and client/server software.
Applications ManagementWhite Papers (View All Report Types)
1 - 25 of 670 Matches Previous Page  | Next Page
Guide: How to Make the Cloud Work for your Organization
sponsored by CDW Corporation
WHITE PAPER: View this guide that will help you tailor a cloud to fit your organization. From infrastructure, applications, public, private and hybrid delivery models – whatever you need – this guide will help you pinpoint the right cloud for you organization.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation

Red Hat Consulting: Migrations and Modernization
sponsored by Red Hat
WHITE PAPER: Modernizing applications and workloads using open source platforms offers lower complexity and a lower total cost of ownership. But without the right partner, these benefits are seldom realized. Check out the following white paper to learn how leading companies are using Red Hat and how they can help you modernize using open source as well.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Red Hat

A guide to performance analysis when using ViewONE professional
sponsored by IBM
WHITE PAPER: The following white paper intends to provide a basis for analyzing and identifying common causes of application performance slowness rather than addressing the needs of a specific application problem. Additionally, this paper covers some of the most typical issues faced by many companies and highlights a software solution designed to help.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

IBM

Best Practices to Help Overcome Cloud Security Concerns
sponsored by CDW Corporation
WHITE PAPER: This report gives your IT shop a better understanding of the threats against cloud technologies, as it highlights 9 top threats along with their implications to enterprise security and possible solutions to address each threat.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation

Battle the Evolving Threat Landscape with Dynamic Authentication Strategies
sponsored by SecureAuth
WHITE PAPER: This resource highlights the vital need for dynamic authentication, especially to increase the effectiveness by reducing false positives and false negatives.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

SecureAuth

IT At A Crossroads: Enabling Developer Innovation With Cloud Services
sponsored by CenturyLink Technology Solutions
WHITE PAPER: In this white paper, a survey of developers shows how IT can better serve developers and contribute to application innovation by providing specific enterprise-grade cloud services.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

CenturyLink Technology Solutions

Protecting Mission-Critical Application Environments
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper discusses mission-critical application backup and recovery, proposing a shift to a more intelligent and adaptive backup and recovery framework that incorporates application awareness, storage integration, and operational analytics.
Posted: 24 Oct 2014 | Published: 26 Sep 2014

Hewlett-Packard Limited

Making the Cloud Your Own: Integrating Cloud and On-Premise Applications with WebSphere Cast Iron
sponsored by IBM
WHITE PAPER: This exclusive whitepaper explores how two organizations approached the task of synchronizing data and integrating the multitude of systems already in data centers with new cloud-based applications.
Posted: 22 Oct 2014 | Published: 12 Sep 2012

IBM

Integration Technology for Hybrid Cloud with WebSphere Cast Iron
sponsored by IBM
WHITE PAPER: This exclusive whitepaper will serve as your buyer's guide for the tools needed for successful cloud integration.
Posted: 22 Oct 2014 | Published: 14 Nov 2012

IBM

Your At-A-Glance Guide to How CIOs are Responding to End-User Computing Complexity
sponsored by VMware
WHITE PAPER: This white paper outlines the top challenges found by IT pros and the top seven strategies, perspectives, and techniques to cope with these challenges in managing their end-user computing environment. Learn about what solutions to consider for multiple delivery models, embracing end-point choice and incorporating a safe a secure environment.
Posted: 20 Oct 2014 | Published: 31 Jan 2014

VMware

A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

8 Common Pitfalls of VDI Projects
sponsored by VMware
WHITE PAPER: This white paper explores the eight common pitfalls associated with VDI and how to avoid them. Read on to ensure that you do not run the risk of disrupting ongoing business operations, losing staff productivity, and creating unhappy end-users when deploying a VDI project.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

VMware

VMware Buys CloudVolumes. Here's Our Full Analysis.
sponsored by VMware, Inc.
WHITE PAPER: This e-guide explores the reasons behind VMware adding CloudVolume and what the impact of the acquisition will have on the company. Learn about what CloudVolume's software company specializes in and how this acquisition will contribute to VMware and their overall general layering space.
Posted: 15 Oct 2014 | Published: 30 Sep 2014

VMware, Inc.

Red Hat Software Collections: Bridging Development Agility and Production Stability
sponsored by Red Hat
WHITE PAPER: This whitepaper introduces you to Red Hat Software Collections, an offering from Red Hat that provides a set of dynamic programming languages, database servers and related packages that provide structural integrity to applications and tools.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Red Hat

Red Hat Developer Toolset
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how, by using the Red Hat Developer Toolset developers, can gain to the latest and most stable versions of essential development tools on a separate life-cycle and a more frequent release cadence.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Red Hat

Cisco UCS C240 M3 with NVIDIA GRID Cards for VMware Horizon View 5.3
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper is to provides specific guidelines and methods to integrate Cisco UCS C240 M3 rack servers with NVIDIA GRID K1 and/or K2 cards with VMware products so that the servers, the hypervisor and the desktop broker are ready for graphic application installation.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Cisco Systems, Inc.

Red Hat Enterprise Linux Developer Subscriptions: Maximize Developer Speed and Productivity with Essential Development Tools
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Enterprise Linux support app development by providing access to industry leading tools, instructional resources, reference architectures, dedicated developer forums and more.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

Red Hat

Virtualizing Tier 1 Applications
sponsored by VMware, Inc.
WHITE PAPER: This exclusive whitepaper explores the virtualization of tier-1 applications and explains why now is the time to do it.
Posted: 09 Oct 2014 | Published: 08 Jan 2014

VMware, Inc.

IT and Enterprise Mobility: IT Is Fully Charged and Ready to Roam
sponsored by CA Technologies.
WHITE PAPER: Do you know how your mobility strategy stacks up against other organizations? This report reveals findings from a Vanson Bourne survey on IT and enterprise mobility.
Posted: 09 Oct 2014 | Published: 09 Oct 2014

CA Technologies.

API Security and Management
sponsored by CA Technologies.
WHITE PAPER: This whitepaper examines the key security and management considerations that need to be taken when looking for an API management solution, such as data security capabilities, POC evaluation and feature breadth.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

CA Technologies.

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Cisco UCS Mini: A Technical Overview
sponsored by Zones, Inc.
WHITE PAPER: This white paper describes how the Cisco UCS, renowned for its ability to unite computing, networking, storage access, and management resources in a single platform, is now optimized for branch and remote offices, point-of-sale, and smaller IT environments with Cisco UCS Mini.
Posted: 06 Oct 2014 | Published: 30 Sep 2014

Zones, Inc.

On-Demand, Scalable Cloud Infrastructure Services
sponsored by NaviSite
WHITE PAPER: This white paper introduces NaviSite's Cloud Infrastructure Services, which provide on-demand access to computing and storage to host legacy applications, resulting in lower capital and operational expenses and decreased ongoing system management requirements, while maximizing flexibility and agility.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

NaviSite

10 Critical Requirements for Cloud Applications
sponsored by Workday
WHITE PAPER: This informative white paper outlines 10 critical requirements of cloud computing to help organizations distinguish the difference between real and fake cloud applications. If cloud apps and their providers don't meet these requirements, it's unlikely they can deliver the full benefits of software-as-a-service – read on now to learn more.
Posted: 03 Oct 2014 | Published: 11 Sep 2012

Workday
1 - 25 of 670 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement