IT Management  >   Systems Operations  >   Applications Management  >  

Application Traffic Management

RSS Feed    Add to Google    Add to My Yahoo!
Application Traffic ManagementReports
 
Premier Academic Medical Center Required Enterprise Level Server Load Balancing (SLB) Solution
sponsored by A10 Networks
WHITE PAPER: This whitepaper explores and effective server load balancing (SLB) solution and how it can increase application performance with the help of ADCs.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

A10 Networks

Revamp your IT solutions with Google Apps
sponsored by Google
WHITE PAPER: This exclusive case study discusses the set of solutions that a global consulting organization was able to use to revamp their IT environment and take full advantage of their mobile workforce.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Google

Switching to Google Apps Brings Impressive Cost Savings and Productivity Benefits
sponsored by Google
WHITE PAPER: This informative resource discusses how switching to Google Apps from a traditional, on-premise environment for messaging and collaboration can help reduce IT costs while significantly increasing worker productivity.
Posted: 26 Feb 2014 | Published: 24 Feb 2014

Google

The Benefits of a Lean Application Portfolio
sponsored by Informatica
WHITE PAPER: Over time, the amount spent on the infrastructure and maintenance of legacy applications and systems can weigh heavy on your IT budget. In this white paper, learn about the changing landscape of enterprise applications and how carrying the burden of legacy systems undermines your enterprise.
Posted: 26 Mar 2014 | Published: 25 Mar 2014

Informatica

Design, Deploy, and Manage a DDoS Protection Architecture
sponsored by F5 Networks
WHITE PAPER: An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS.
Posted: 31 Mar 2014 | Published: 30 Nov 2013

F5 Networks

Increasing Application Visibility in Your Network Monitoring
sponsored by Compuware
WEBCAST: Access this page now and register for a one of a kind webinar that will explore the warning signs of inadequate application monitoring and how you can make sure your business solves these problems.
Posted: 11 Apr 2014 | Premieres: May 8, 2014, 13:00 EDT (17:00 GMT)

Compuware

Gaming Company Uses Cloud Infrastructure for Top Performance
sponsored by IBM
WHITE PAPER: In this brief case study, learn how KUULUU -- an interactive gaming company -- leveraged an Infrastructure-as-a-Service (IaaS) platform that could adjust to their dynamic infrastructure needs, so they didn't have to worry about downtime or security, enabling them to focus on their core mission.
Posted: 17 Apr 2014 | Published: 31 Dec 2013

IBM

Webcast: Imagine a Data Center without SANs: Optimize Cost and Performance for your Data Center with Solid-State Storage
sponsored by Symantec Corporation
WEBCAST: In this webinar, discover how you can take advantage of new business value as data centers evolve and modernize with revolutionary solid-state storage technologies.
Posted: 10 Mar 2014 | Premiered: Mar 20, 2014

Symantec Corporation

On the Safe Side: Managing Security in Mobile Apps
sponsored by TechTarget
RESOURCE: Software development projects aren't always on top of the security management list, but when it comes to enterprise mobility applications, there's no question about its precedence. Take this survey to gain access to an e-book that highlights 7 tips to protect enterprise data and how to avoid the perpetual cycle of insecurity.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

TechTarget

Jack Gold: The Enterprization of Mobile Apps: Moving from Corporate Liability to Business Asset
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines a mobile management strategy that can enable your organization to plan, implement and operate the most cost-effective applications with the greatest degree of security and user productivity. Read on to learn more.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement