Software  >   Applications Software  >   Enterprise Applications Software  >  

Maintenance Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Maintenance Management Software Reports
Successfully Mitigating Corporate Risk
sponsored by AT&T Corp
WHITE PAPER: This paper discusses how to help reduce risk and successfully manage your security infrastructure through conducting vulnerability assessments, using discovery tools, adopting centralized policy setting and event correlation, and taking a cohesive approach to updating network equipment.
Posted: 06 Apr 2010 | Published: 05 Apr 2010

AT&T Corp

Automating Job Card Generation for Maintenance, Repair and Overhaul
sponsored by Enigma, Inc.
WHITE PAPER: Manual job card generation processes significantly hamper maintenance efficiency and accuracy for A, B, C, and D checks alike, directly resulting in lost time, errors, and flight delays.
Posted: 11 Mar 2008 | Published: 01 Oct 2007

Enigma, Inc.

Tube Lines Takes Stock of Its Assets with IBM Maximo Asset Management
sponsored by IBM
CASE STUDY: Integrating asset maintenance activity and equipment history in IBM Maximo with financial and planning systems is helping Tube Lines meet its financial targets, plan for long-range capital investments and improve the rail infrastructure. Read this case study now to learn more.
Posted: 08 Dec 2010 | Published: 08 Dec 2010


It’s Time for Maintenance 2.0
sponsored by Apriso Corporation
WHITE PAPER: This paper details why legacy maintenance systems are failing to help manufacturers meet the current challenges facing their maintenance operations. A new “Maintenance 2.0” approach that extends ERP plant maintenance and that coordinates maintenance with operations will lead to increased equipment uptime, improved compliance and lower costs.
Posted: 30 Nov 2010 | Published: 30 Nov 2010

Apriso Corporation

The Tools for Continuous Delivery
sponsored by Puppet Labs
WHITE PAPER: This white paper covers the benefits of adopting continuous delivery processes, and delves into the most common tools that make this possible. Download now to discover how to improve your development agility with continuous delivery tools.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Puppet Labs

APM 101: Getting Started with Synthetic Monitoring
sponsored by Neotys
WHITE PAPER: This white paper will discuss the rising importance of application performance monitoring and its benefits to your organization. You'll learn the key differences between synthetic monitoring, real-user monitoring and deep-dive diagnostics and discover how they can improve the overall performance and availability of your web and mobile applications.
Posted: 06 Oct 2015 | Published: 06 Oct 2015


2015 State of the Connected Patient
sponsored by
WHITE PAPER: According to the '2015 State of the Connected Patient' report, modern technology plays a crucial role in addressing the challenge of delivering preventative care. Download this report to gain insight on trends impacting the state of patient care in the United States; how patients currently connect with providers; and more.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Simplify and Mobilize Any Business Workflow Securely by Next Week
sponsored by Citrix and Capriza
WEBCAST: In this webinar, you'll learn what it takes to rapidly design and securely deploy apps for your critical business workflows. View now to gain the opportunity to watch as a customized app is designed and deployed in 10 minutes, without the need for complex APIs or writing code.
Posted: 20 Aug 2015 | Premiered: Sep 22, 2015

Citrix and Capriza

The CIO's Guide to Understanding Bimodal IT
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this expert guide to discover whether you should investigate the bimodal IT model for your enterprise, or whether sticking with your tried-and-true development process is a safer bet for the time being.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

Dell, Inc. and Intel®

Is Data Less Secure in the Cloud: Fact or Myth?
sponsored by Dell, Inc.
WEBCAST: In this brief webcast, Ramses Gallego, Security Strategist at Dell Software, the questions that should be asked about the processes and people involved in enterprise data sharing and transfer. Click here to see why a cloud approach to data security may be the best strategy.
Posted: 25 Aug 2015 | Premiered: Aug 25, 2015

Dell, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement