IT Management  >   Systems Operations  >  

Applications Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Application Availability, Software Applications Management, Software Management, Application Management, Software Application Management, Software Distribution
DEFINITION: The management of the performance and monitors the availability of network applications, such as e-mail, intranets and client/server software.
Applications Management Reports
26 - 50 of 1253 Matches Previous Page  |  Next Page
Meeting Meaningful Use and Optimizing IT and Clinical Productivity
sponsored by AppSense
WHITE PAPER: Access this white paper to discover how user virtualization is adding value to healthcare organizations by enabling all aspects of the user to be stored and managed independent of the accessing device. Find out how this complies with privacy and security mandates while also allowing anytime, anywhere, seamless access to applications and files.
Posted: 11 Feb 2015 | Published: 30 Dec 2011

AppSense

A Computer Weekly buyer's guide to enterprise app stores and self-service IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly assesses how businesses can go about setting up an enterprise app store and integrating it with IT service management in this 11-page buyer's guide.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

ComputerWeekly.com

Traditional Development Practices Will Fail for Mobile Apps
sponsored by Perfecto Mobile
ANALYST REPORT: Access this analyst report from the experts at Gartner to learn about why traditional methods of development will not work for mobile apps.
Posted: 10 Feb 2015 | Published: 15 Apr 2014

Perfecto Mobile

Launch Better Mobile Apps, Faster: Introducing Continuous Quality
sponsored by Perfecto Mobile
VIDEOCAST: Access this webcast to discover how to launch mobile apps faster, using continuous quality for every stage of the development process.
Posted: 10 Feb 2015 | Premiered: Feb 10, 2015

Perfecto Mobile

Navigating The Route To The Cloud
sponsored by Crayon Group
WHITE PAPER: Access this white paper to discover a service designed to put you in control of your company, and provide a clear roadmap to the cloud.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Crayon Group

Transcript: What Brian Madden thinks about vWorkspace
sponsored by Dell, Inc.
PRESENTATION TRANSCRIPT: Access this presentation transcript to examine what desktop virtualization expert Brian Madden thinks about Dell vWorkspace 8.5 and how it compares to other VDI options on the market.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc.

How Nationwide Children's Hospital Increased Manageability Desktops Securely
sponsored by AppSense
CASE STUDY: Download this case study to see how one healthcare organization implemented user virtualization technology in order to overcome the difficulties of providing users with personalized desktops with the control IT wanted.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

AppSense

Virtualization Workloads
sponsored by Dell, Inc.
VIDEO: Watch this brief video to learn how a portfolio of next-generation servers can deliver the performance, scalability, and reliability your virtualized environments need to truly excel.
Posted: 06 Feb 2015 | Premiered: 07 Sep 2014

Dell, Inc.

Case Study: Integrated health system optimizes electronic medical record performance and reliability
sponsored by AppSense
CASE STUDY: Access this case study to find out how WellSpan Health was able to deliver faster, more reliable access to patient records with the help of a performance manager.
Posted: 06 Feb 2015 | Published: 06 Feb 2015

AppSense

The Top 5 Security Goal Challenges
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource distills the reports and opinions of 300 IT decision-makers into a realistic picture of the current state of software security in enterprises across a range of industries.
Posted: 06 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Few Businesses Feel Fully Prepared for Software Security Risks
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper reveals the results of a recent survey that explored enterprises' confidence in the security of the software that runs their businesses.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

Hewlett-Packard Company

7 Core Elements Needed in a Solution to Protect Business-Critical Applications
sponsored by Onapsis
WHITE PAPER: This white paper examines the seven core elements needed in a solution to provide comprehensive security for business applications – as well as three elements that are often overlooked by teams but should absolutely be a part of existing security programs.
Posted: 03 Feb 2015 | Published: 03 Feb 2015


Best Practices for PC Lockdown and Control Policies
sponsored by Viewfinity
WHITE PAPER: Fewer end user installed applications results in fewer application compatibility issues and better system reliability. Application instability and application conflicts generate a large number of support requests. Fewer unauthorized applications results in fewer support incidents and this leads to a lower TCO.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

Viewfinity

Know the Big Three: Top three mobile application threats
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive paper examines how to prevent sensitive data leakage over insecure channels or stolen devices. Read on to discover the top three threats to mobile applications and how to mitigate their potential impact.
Posted: 01 Feb 2015 | Published: 26 Aug 2014

Hewlett-Packard Company

Enterprise Software Security Strategies Pulse Report (SSA)
sponsored by Hewlett-Packard Company
WHITE PAPER: This survey report by Gatepoint Research explores the extent to which IT organizations employ application security testing and remediation solutions.
Posted: 01 Feb 2015 | Published: 31 Oct 2014

Hewlett-Packard Company

Master the Lifecycle of Work to Eliminate Project Pandemonium
sponsored by Workfront
WHITE PAPER: This white paper considers the lifecycle of work - a 7 step methodology to bolster project success and task management. Read on to see how your project teams can finally focus on the bigger picture and not just the tasks at hand.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Workfront

Moving from Waterfall to Agile: Lessons Learned From 20 Experts
sponsored by AtTask
WHITE PAPER: This white paper discusses the essentials to moving from Waterfall methodology to Agile, told through lessons learned by 20 industry experts. Access now to find out if Agile is right for you - and how to implement it with the greatest success.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

AtTask

Learn why NSS Labs Recommends NetScaler AppFirewall
sponsored by Citrix
WEBCAST: This exclusive webcast takes an in-depth look at application firewalls and includes a study of how one web application firewall (WAF) was able to toe the line and meet industry standards. Read on to learn more.
Posted: 28 Jan 2015 | Premiered: Jan 26, 2015

Citrix

Mobile Applications: How to Stay Ahead of the Game
sponsored by Hewlett-Packard Company
VIDEO: This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Hewlett-Packard Company

Learning and Analytics: Bridge the gap in your workforce's capabilities
sponsored by SAP
WHITE PAPER: Access this white paper to find out why learning with analytics bridges the gaps in your workforce's capabilities, improves performance, and delivers a quantifiable ROI.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

SAP

Cloud Readiness: Securing Access to Your Private Cloud
sponsored by Ping Identity Corporation
EBOOK: This eBook explains the benefits of moving enterprise applications to the cloud and describes how to keep your applications and data secure during this process.
Posted: 27 Jan 2015 | Published: 27 Jan 2015

Ping Identity Corporation

Customers Redefine Microsoft
sponsored by EMC Corporation
WEBCAST: View this webcast now to hear from IT professionals from top companies in different industries discuss how their IT infrastructure was better able to support their business goals by using innovative cloud technology.
Posted: 26 Jan 2015 | Premiered: Jan 26, 2015

EMC Corporation

Web Application Security for Dummies
sponsored by Qualys
EBOOK: This e-book explains how to quickly locate and remediate vulnerabilities in order to prevent attackers from gaining control over the application and obtaining access to the server, database, and other back-end IT resources.
Posted: 26 Jan 2015 | Published: 30 Dec 2011

Qualys

Top Advice for Implementing Mobile ERP
sponsored by Epicor Software Corporation
EGUIDE: Access this in-depth, expert e-guide to learn more about mobile and cloud technologies and how these technologies can ease ERP woes.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Epicor Software Corporation

Transform Mobile Testing from Scripts to Continuous Quality
sponsored by Perfecto Mobile
WEBCAST: Sign up for this on-demand webcast to find out how a continuous quality approach accelerates your release schedule, catches defects before they go into production, and improves the user experience. Tune in to catch a hands-on demonstration featuring how to create and test code continuously throughout the SDLC.
Posted: 29 Jan 2015 | Premiered: Feb 3, 2015, 14:00 EST (19:00 GMT)

Perfecto Mobile
26 - 50 of 1253 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement