Business of Information Technology  >   Business Management  >   Portfolio Management (IT Management)  >  

Application Portfolio Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: APM
DEFINITION: A program that allows you to assess the applications in your portfolio, evaluate potential changes, and understand the risks and impact of these changes to the portfolio. APM is a discipline and a tool set that enables a CIO to respond to the pressures of managing an application portfolio.
Application Portfolio ManagementReports
1 - 25 of 104 Matches Previous Page  | Next Page
Case Study: OSS vs. Commercial, Choosing between WebSphere and Jboss
sponsored by IBM
CASE STUDY: The allure of free software, specifically open-source software (OSS), has drawn the attention of many companies. View this case study now to read about the insurance company Topdanmark and their debate between commercial and OSS options – and the advice they offer to companies in the same position.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

IBM

Identify the best VMware licensing - HP SLMS
sponsored by Hewlett-Packard Limited
WHITE PAPER: Maximizing the investment in VMware licensing is challenging, especially in regards to tracking renewals and complying with licensing requirements. This whitepaper discusses the advantages of a software licensing management system. Also discover the best way to analyze your enterprise's needs for licensing agreements to maximize your investment.
Posted: 26 Aug 2014 | Published: 26 Aug 2014

Hewlett-Packard Limited

5 Ways Software Load Balancers Help Development (And Business)
sponsored by Nginx, Inc.
WHITE PAPER: The ability to deliver applications in a scalable, maintainable, and flexible development environment is essential to success moving forward. View this whitepaper now to see how hardware-based load balancers can be a hindrance to your ability to deliver applications.
Posted: 25 Aug 2014 | Published: 25 Aug 2014

Nginx, Inc.

Choosing the Right API Management Solution for the Enterprise User
sponsored by CA Technologies.
WHITE PAPER: Publishing application programming interfaces (APIs) to an external developer community introduces a number of challenges and risks for the enterprise. This informative whitepaper considers a system that regulates security protocols and automates access for APIs, promoting a secure yet intuitive platform for API delivery.
Posted: 22 Aug 2014 | Published: 31 Dec 2013

CA Technologies.

Reduce your software spend - HP Software Licensing and Management Solutions (SLMS)Software Asset Management (SAM)
sponsored by Hewlett-Packard Limited
WHITE PAPER: Decreasing budgets are forcing enterprises to demand services that are tailored to fit specific business requirements. This whitepaper considers one SLMS option that covers cloud, virtualization, mobility, and BYOD. View now to see the results some companies have seen.
Posted: 21 Aug 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited

Optimize your software investment - HP Enterprise Software Licensing and Management Solutions (SLMS)
sponsored by Hewlett-Packard Limited
WHITE PAPER: It is increasingly difficult for enterprises to purchase and deploy assets using a multitude of vendors, devices and platforms. This whitepaper discusses software licensing and management solutions (SLMS) and the advantages of systems like this.
Posted: 21 Aug 2014 | Published: 31 Jul 2014

Hewlett-Packard Limited

Large Financial Services Firm Passes Its PCI Audit— and Implements an Ongoing Governance Program
sponsored by Veracode, Inc.
CASE STUDY: A large financial services firm sought help with a one-time project to pass its payment card information (PCI) audit. View this case study now to see how this financial firm decided on continuous analysis, and the advantages they saw as a result. Also learn about a software system that achieves this without acquiring more servers.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER: 64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Veracode, Inc.

How to Migrate 50 Apps to AWS in 50 Days
sponsored by Cloud Technology Partners
WEBCAST: A Fortune 50 enterprise needed to migrate 50 applications to a web service in 50 days. View this webinar now to see a web services system that helps streamline enterprise portfolios. Find out which applications can be adapted and how to evaluate your application portfolio to identify optimal candidates for the cloud.
Posted: 19 Aug 2014 | Premiered: Aug 19, 2014

Cloud Technology Partners

Automating the Application Release Process: Build vs. Buy
sponsored by CA Technologies.
WHITE PAPER: Companies are turning to application release automation as a cost-effective solution for development bottlenecks. Some are able to write shell scrips to automate deployment activities. Read about the essentials for building, executing, and managing release automation, and discover software that provides automation from the ground up.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

CA Technologies.

Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
TRANSCRIPT: Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Webinar: When is Application Security Done?
sponsored by Veracode, Inc.
TRANSCRIPT: Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Veracode, Inc.

Five Program Management Best Practices When Designing App Security
sponsored by Veracode, Inc.
WHITE PAPER: Program management is essential during the early stages of designing an application security program. This whitepaper discusses how a company implemented program management while developing an application security program, and the results they saw.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Addressing the Scalability Challenge with Cloud-Based Application Security
sponsored by Veracode, Inc.
WHITE PAPER: Ad-hoc application security programs have led to inconsistent policies across businesses, as shown in this startling statistic: 93% of companies suffered a data breach in 2013. This whitepaper considers a software system that focuses on scalability and simplicity.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Veracode, Inc.

Learn Faster: Deploy What You Have - Virtualize What You Don't
sponsored by IBM
WEBCAST: Software development teams are turning to Agile development to increase both the quality and the turnaround time for their products. This webcast discusses the advantages of leveraging a balance of both deployment automation and service virtualization, ultimately establishing an efficient integration testing pattern.
Posted: 18 Aug 2014 | Premiered: Aug 18, 2014

IBM

Greater Strategic Effectiveness Through Perpetual Planning
sponsored by CA Technologies.
EBOOK: Companies must work harder to hold on to customers and remain relevant. View this whitepaper now to learn about perpetual planning, enabling continuous and rapid responses to internal and external changes. Discover best practices for perpetual planning.
Posted: 18 Aug 2014 | Published: 31 Dec 2013

CA Technologies.

Top 5 Cloud Coding Mistakes in Java Applications
sponsored by Cloud Technology Partners
WHITE PAPER: The focus of organizations has shifted to large portfolios of existing applications which were never designed to work well in a cloud environment. This whitepaper tackles 5 common coding mistakes made in Java applications, and provides analysis of the cause and clear solutions.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

Cloud Technology Partners

Mobile Apps are the Future - Is Your Enterprise Ready
sponsored by BlackBerry
WHITE PAPER: The rise of "bring your own device" (BYOD) has highlighted the need for companies to prioritize mobile productivity. View this whitepaper to find out why enterprise mobile app development is on the rise, and best practices for companies to stay ahead of the curve.
Posted: 15 Aug 2014 | Published: 15 Aug 2014

BlackBerry

Application Portfolio Management: Treat Software as a Valuable Asset
sponsored by Innotas
EGUIDE: This e-guide explains how application portfolio management (APM) allows organizations to oversee the applications that run their business, helping to ensure efficient and accurate inventory.
Posted: 14 Aug 2014 | Published: 14 Aug 2014

Innotas

Modernizing Applications for the Cloud
sponsored by Dell, Inc.
EGUIDE: Companies are turning to legacy application modernization to reduce costs and maintenance efforts. This expert whitepaper provides clear steps to consider when modernizing your legacy applications to a cloud environment.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Dell, Inc.

Effective Application Modernization: Your Expert Guide to Application Portfolio Analysis
sponsored by Dell, Inc.
EGUIDE: Experts believe that a shift to business-focused application portfolio anagement is currently under way, giving organizations the opportunity to align objectives with enterprise demands. View this expert eGuide now to find out how companies are re-evaluating their business application portfolio to modernize legacy applications.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Dell, Inc.

Application Modernization in the Cloud
sponsored by Dell, Inc.
EGUIDE: The burdens of legacy applications ripple throughout companies – some enterprises invest 75% of their IT budgets on maintaining and supporting legacy applications. In this expert whitepaper, find out how legacy application modernization can reduce costs and maintenance, while improving your enterprise agility.
Posted: 11 Aug 2014 | Published: 11 Aug 2014

Dell, Inc.

Software development for electronics
sponsored by IBM
WHITE PAPER: The electronics industry has seen dramatic changes – customers have demanded accelerated product innovation, forcing the compression of product life cycles. This whitepaper discusses key factors in accelerating innovation and time to market for electronic devices, focusing on embedded software development.
Posted: 07 Aug 2014 | Published: 31 Jul 2013

IBM

How Trek Bicycle Operated Smarter with AtTask
sponsored by AtTask
PRODUCT OVERVIEW: Trek Bicycle needed to revamp their project management methods – project delivery was essential. This video shows what Trek Bicycle did to improve their project management systems, and how their teams and revenues were positively affected by the choice.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

AtTask

Project Management Software Has Evolved, And You Need to Keep Up
sponsored by AtTask
EBOOK: Project management has evolved exponentially, trying to keep up with an increasingly complex and demanding business climate. This whitepaper discusses how some PPM tools fall short, and what the modern project management requires to be successful.
Posted: 07 Aug 2014 | Published: 07 Aug 2014

AtTask
1 - 25 of 104 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement