IT Management  >   Systems Operations  >   Applications Management  >  

Application Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Applications Monitoring
DEFINITION: The process of detecting and reporting problems with the proper operation of an application.
Application Monitoring Reports
1 - 25 of 379 Matches Previous Page  |  Next Page
Connected Health Cloud Brochure
sponsored by CloudMine
WHITE PAPER: Discover the different facets of a healthcare app development solution that can help your healthcare organization quickly and reliably create apps that are HIPAA compliant.
Posted: 30 Jun 2016 | Published: 30 Jun 2016


Newly Announced Tools For Healthcare App Building
sponsored by CloudMine
WHITE PAPER: Discover the importance of an interoperability engine, cognitive analytics, and developer tools. Learn how to connect with leading big data analytics platforms, utilize cognitive analytics to improve compliance reporting, incorporate wearables into the continuum of care, and more.
Posted: 30 Jun 2016 | Published: 01 Mar 2016


Get To Market Faster
sponsored by CloudMine
CASE STUDY: Discover how a healthcare organization with limited technology resources was able to deploy a feature-rich, HIPPA compliant mobile app.
Posted: 30 Jun 2016 | Published: 30 Jun 2016


Deciphering the Latest in iOS Open Source Healthcare Software
sponsored by CloudMine
WHITE PAPER: Developing revolutionary apps isn't just a matter of having the best team. Learn about how a newly released healthcare-focused, open source software framework can change the way healthcare app developers build and how they capture clinical research data in real-time.
Posted: 30 Jun 2016 | Published: 23 Mar 2016


Achieve Faster Time to Quality with Continuous Validation and Verification
sponsored by IBM
WHITE PAPER: Learn about two of the key components of continuous engineering: validation and verification. Discover how using these methods can speed up your development process and improve outcomes by helping you detect defects earlier and produce higher quality products.
Posted: 29 Jun 2016 | Published: 31 Jan 2015

IBM

Interoperability and the Cloud in Connected Health
sponsored by CloudMine
WHITE PAPER: Learn how to conquer the interoperability, compliance, and security issues holding your organization back from leveraging cloud platforms to develop revolutionary applications.
Posted: 29 Jun 2016 | Published: 29 Jun 2016


Accelerating the Building, Managing, and Deployment of Healhcare Apps
sponsored by CloudMine
WHITE PAPER: Discover how your healthcare organization can reduce initiative time to market by up to 70% and create a multimedia app compatible with almost any device to contain the overflow of patient information that is received every day.
Posted: 28 Jun 2016 | Published: 04 Mar 2016


IBM MaaS360 Mobile Application Management
sponsored by IBM
RESOURCE: Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.
Posted: 21 Jun 2016 | Published: 29 Jan 2016

IBM

Should On-Prem Apps Use SaaS Monitoring?
sponsored by New Relic
WHITE PAPER: Need better visibility into the health of the applications running in your data center? Software-as-a-service (SaaS) solutions are the best way to monitor on-prem apps and gain the freedom your team needs. Discover the top 7 reasons to use SaaS monitoring.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

New Relic

5 Tips and Tricks for Monitoring Your AWS Environment Using New Relic
sponsored by New Relic
WHITE PAPER: Access this resource to explore 5 best practices for monitoring AWS using New Relic. Inside, learn how to boost end-user experience, simplify performance management, and reduce the cost of your AWS environment.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

New Relic

Gone Critical: The Evolution in Application Availability
sponsored by Veeam Software
WHITE PAPER: In today's business landscape, constant availability is the key to staying competitive. This is no small task. Read on to learn about an always-on backup and recovery service that makes your critical applications available at all times.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

Nimble Storage InfoSight Redefines IT Infrastructure Management
sponsored by Nimble Storage
VIDEO: What happens when you gather and analyze hundreds of thousands of data points? Watch this video to learn how to analyze and predict problems, as well as improve your business intelligence.
Posted: 20 May 2016 | Premiered: 15 Apr 2016

Nimble Storage

The App-Data Gap
sponsored by Nimble Storage
WHITE PAPER: US companies are losing about $7.5 billion in worker time because of application delays and downtime. This is where the App-Data Gap comes into play. Discover how much this gap is hurting your business and what you can do to prevent further injury.
Posted: 17 May 2016 | Published: 04 May 2016

Nimble Storage

Application Awareness: The Critical Enabler in Virtualized Networks
sponsored by Ipoque
WHITE PAPER: Application awareness delivers information about traffic patterns and user behavior, quite important for SDN and network function virtualization. Discover the key role of application awareness in providing essential network intelligence that enables more efficient routing of applications and vital analytics to drive new NFV/SDN service deployments.
Posted: 17 May 2016 | Published: 29 Apr 2016

Ipoque

OGL Computer Uses VMware App Volumes Solution to Grow Services and Save Costs in Citrix Environment
sponsored by VMware
CASE STUDY: Access this case study to see how one company was able to implement an application management solution to experience major business benefits including saving 95% of IT staff time.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

3 Key Features For Flexible Bandwidth In The Cloud
sponsored by Level 3 Communications, Inc.
WHITE PAPER: It's old news that the cloud offers greater flexibility than traditional networks—but what about when it comes to bandwidth? Access now to get the answers to three key questions regarding extending cloud bandwidth flexibility.
Posted: 10 May 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

UCAS Enhances Customer Service through Improved Application Management
sponsored by Splunk
CASE STUDY: Access this case study to see how UCAS was able to deliver continuous service during peak times while improving customer experience, security and more.
Posted: 19 Apr 2016 | Published: 06 Apr 2016

Splunk

End-to-End Service Intelligence Provides Vodafone With Actionable Insights for In-Depth Issue Investigation
sponsored by Splunk
CASE STUDY: Telco company Vodafone, was struggling to achieve visibility into the health and performance of its services. In this case study, discover how one system helped Vodafone proactively find and address system issues quickly and easily with increased visibility.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

Splunk

Architectural Choices for the HANA-Bound SAP Customer
sponsored by IBM
WHITE PAPER: This white paper takes an in-depth look at the architectural choices available to SAP customers who have decided to move to HANA. Learn now about the evolution toward HANA, its next stage, and the advantages behind certain partnerships.
Posted: 06 Apr 2016 | Published: 28 Aug 2015

IBM

Mobile App Monitoring Powered by Big Data Analytics
sponsored by Hewlett-Packard Enterprise
VIDEO: More than half of all mobile app users will delete an app with poor performance, so it's essential to monitor your apps to ensure a satisfying user experience. Discover how a big data analytics platform can monitor the performance, crashes, errors, and resource usage of each user's mobile app
Posted: 05 Apr 2016 | Premiered: 22 Jan 2016

Hewlett-Packard Enterprise

App and Threat Intelligence Defense Strategy Revealed
sponsored by Ixia
WHITE PAPER: In this white paper, delve deeper into app and threat intelligence defense strategies to mitigate hacker attempts to break through your vulnerabilities.
Posted: 15 Mar 2016 | Published: 25 Nov 2015

Ixia

SAP SYSTEMS ANALYSIS Business Risk Illustration
sponsored by Onapsis
WHITE PAPER: This white paper helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 09 Mar 2016 | Published: 29 Feb 2016

Onapsis

How to Unleash the Full Potential of Linux with Docker Containers
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to achieve the ultimate flexibility for business critical Linux applications with Docker containers. Read on to take advantage of enterprise-grade automation, orchestration, management, visibility, and control capabilities for the application development and deployment process.
Posted: 01 Mar 2016 | Published: 31 Aug 2015

IBM

The Cloud App Visibility Blindspot
sponsored by Imperva
WHITE PAPER: Learn about the visibility blind spot when adopting SaaS apps and the increased risks organizations face with employee use of "Shadow IT."
Posted: 11 Feb 2016 | Published: 16 Sep 2015

Imperva

Cloud Deployment Elucidates Pros and Cons for Legacy Applications
sponsored by Oracle Corporation
EGUIDE: There are many common mistakes organizations make when deploying applications in the cloud—and each differs in severity. Read on to discover several commonplace mistakes made in cloud application deployment, as well as determine the pros and cons of legacy applications that the cloud elucidates.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Oracle Corporation
1 - 25 of 379 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement