IT Management  >   Systems Design and Development  >   IT Infrastructure  >  

Application Infrastructure

RSS Feed   
ALSO CALLED: Applications Infrastructure
DEFINITION: A high performance, reliable, and secure integrated technology infrastructure for managing multiple hosted applications by Application Service Providers.
Application Infrastructure Reports
1 - 25 of 445 Matches Previous Page  |  Next Page
Radikale Innovation im Kundenservice vorantreiben
sponsored by ServiceNow
EGUIDE: Erfahren Sie in diesem Whitepaper unter anderem über 5 entscheidende Schwerpunkte, die Sie benötigen, um immer höheren Kundenanforderungen erfolgreich gerecht zu werden.
Posted: 13 Oct 2021 | Published: 13 Oct 2021

ServiceNow

Scalable storage performance for cloud native applications
sponsored by Red Hat
ANALYST REPORT: This Evaluator Group report, commissioned by Red Hat, compares 3 leading software defined storage offerings for cloud native applications and evaluates their performance, scalability, manageability, and ease of use. Access it here to learn their findings.
Posted: 05 Oct 2021 | Published: 05 Oct 2021

Red Hat

Application Performance Management: Improving service availability
sponsored by ComputerWeekly.com
EGUIDE: If it can't be measured, it can't be managed. Telemetry on applications and IT infrastructure are key to keeping applications running optimally and reducing unplanned downtime. Beyond using telemetry data to respond to abnormal events, historical data analysis can reveal more systemic issues. In this e-guide we look at trends in APM.
Posted: 13 Sep 2021 | Published: 13 Sep 2021

ComputerWeekly.com

The State of Application Modernization and Hybrid Cloud Computing
sponsored by VMware & Intel
ANALYST REPORT: To gain insight into best practices for managing applications and environments, VMware commissioned Management Insight Technologies to survey more than a thousand global companies worldwide about their strategies. Access this report to see their findings.
Posted: 20 Aug 2021 | Published: 20 Aug 2021

VMware & Intel

A Computer Weekly buyer's guide to secure and agile app development
sponsored by ComputerWeekly.com
EGUIDE: As apps become increasingly integral to business operations, the importance of keeping them secure can never be overstated. In this 15-page buyer's guide, Computer Weekly looks at how firms can protect apps from ransomware, why app creation needs to happen at pace, and how to get the right balance between security and coding
Posted: 02 Aug 2021 | Published: 02 Aug 2021

ComputerWeekly.com

All in Why ecosystems matter a CIO whitepaper
sponsored by Red Hat
WHITE PAPER: Read this white paper to learn how Red Hat’s OpenShift ecosystem simplifies application and environment deployment, offers powerful and consistent tools for scaling across any cloud, and enables future innovation with dependable and APIs and ABIs.
Posted: 12 May 2021 | Published: 12 May 2021

Red Hat

Two Fortune 500 Financial Institutions
sponsored by Prosimo
CASE STUDY: Two large Fortune 500 financial institutions in the US and UK had local branches connected using VPLS/MPLS trunks links. With staff working remotely, they looked for alternative options to reduce the cost of transport and reliably deliver low-latency secure access. View this case study to learn how Prosimo was able to help.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

Prosimo

API Security 101: Your Expert Guide to API Defense
sponsored by TechTarget
RESOURCE: As organizations take measures against common vulnerabilities, hackers have set their sights on a new target: APIs. This e-guide shines a light on API risks and vulnerabilities, as well as the tactics forward-thinking businesses can use to stay secure.
Posted: 01 Apr 2021 | Published: 02 Apr 2021

TechTarget

Cloud Native PostgreSQL: a Kubernetes Operator
sponsored by EnterpriseDB
WEBCAST: Cloud Native PostgreSQL is a Kubernetes operator fully integrated with its API server. In this webinar, you’ll learn how this Kubernetes operator can help automate key processes like deployment and configuration, failover and failover detection, updates and switchovers, and more.
Posted: 15 Mar 2021 | Premiered: Mar 15, 2021

EnterpriseDB

Getting Started with Apache Kafka
sponsored by TIBCO
WHITE PAPER: Apache Kafka’s strength as a messaging platform comes from its log-based architectural approach, creating a fast and lightweight way to store data without losing messaging efficacy. Read this short white paper to discover some of the pros and cons of Kafka and learn more about the Kafka Connect toolkit.
Posted: 10 Mar 2021 | Published: 10 Mar 2021

TIBCO

The Guide to Modern APM
sponsored by Splunk
RESOURCE: To accelerate innovation and protect digital and cloud investments, organizations need to prioritize modern infrastructure monitoring and application performance monitoring (APM) solutions that are built in and for the cloud. Read The Guide to Modern APM to see why legacy APM fails and how Splunk’s Observability Suite may be able to help.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Splunk

API Security & the OWASP API Top 10 (BOLA/IDOR) - 1 of 4
sponsored by Traceable
WEBCAST: Bad actors have moved beyond attacking just applications – they’re attacking APIs, too. But what makes APIs prime targets? How has app security changed? Why is there a need for a new OWASP project for APIs? Access this webcast to answer these questions and to cover Broken Object Level Authentication (BOLA), the most critical API vulnerability.
Posted: 17 Feb 2021 | Premiered: May 20, 2020

Traceable

5 Things To Consider When Choosing An APM Tool
sponsored by Splunk
EBOOK: To accelerate innovation and protect digital and cloud investments, organizations need to invest in modern monitoring and application performance monitoring (APM) solutions that are built for the new data age powered by the cloud. In this e-book, explore 5 things you must consider when picking an APM tool.
Posted: 27 Jan 2021 | Published: 27 Jan 2021

Splunk

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Why Security is Now a Critical Component of Application Delivery
sponsored by Radware
WHITE PAPER: Because today’s threats can be so costly, combining application protection with application delivery has become mission-critical. Radware Alteon is an application delivery solution that integrates web application firewall (WAF), bot management and automation to ensure apps stay secure. Jump into this solution brief for a product overview.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Application Modernization Today: 6 Reasons To Choose A Consistent Infrastructure Platform
sponsored by VMware Intel
WHITE PAPER: In this custom eBook, learn how to create and execute on a winning, future ready strategy for application modernization and discover 6 reasons to choose a consistent infrastructure platform.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

VMware Intel

Why DevOps Has Not Become DevSecOps
sponsored by WhiteHat Security
WEBCAST: Access this white paper to see the 6 myths that are contributing to the lack of DevSecOps adoption, watch as they are easily debunked, and learn 8 recommendations moving forward with this new understanding.
Posted: 18 Nov 2020 | Premiered: Nov 18, 2020

WhiteHat Security

The Business Value of Red Hat Soultions and Cost Relationship to Unpaid Alternatives
sponsored by Red Hat and TCS
DATA SHEET: Review this data sheet to see the business value of implementing Red Hat Solutions including 3 key results and 3 key benefits.
Posted: 10 Nov 2020 | Published: 10 Nov 2020

Red Hat and TCS

Computer Weekly - 7 April 2020: Adapting IT to the new normal
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we talk to four top IT leaders to find out how they are supporting their organisations through the coronavirus crisis. We look at the security best practices recommended by experts to ensure safe remote working for staff. And the CISO of Equifax explains why the firm is moving to public cloud. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Magic Quadrant for Application Performance Monitoring
sponsored by Splunk
WHITE PAPER: Access this Gartner white paper to see their Magic Quadrant which evaluates the strengths and cautions of the leading application performance monitoring vendors.
Posted: 14 Sep 2020 | Published: 22 Apr 2020

Splunk

Equifax Success in Security Transformation
sponsored by Sonatype
CASE STUDY: Access this case study to learn how Equifax achieved a security transformation through Sonatype Nexus Life cycle and Nexus Repository.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Sonatype

TOP 10 CONSIDERATIONS WHEN SELECTING A SOFTWARE COMPOSITION ANALYSIS (SCA) SOLUTION
sponsored by Sonatype
WHITE PAPER: With so much at stake using open source code, it is important that you choose the perfect software composition analysis (SCA) solution for your needs. Access this white paper to learn the top 10 considerations when choosing an SCA solution.
Posted: 08 Sep 2020 | Published: 08 Sep 2020

Sonatype

Managing Kubernetes: From a Small Fleet to a Navy of Clusters
sponsored by D2IQ, Inc.
WHITE PAPER: Check out this eBook to learn best practices for governing multiple clusters and workloads in Kubernetes.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

D2IQ, Inc.

Computer Weekly - 13 July 2021: Driving intelligence - behind the scenes of Volkswagen's in-car software
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes of Volkswagen's in-car software R&D centre. The UK's largest supercomputer has gone live in Cambridge – we find out how it will transform healthcare research. And we talk to DWP's digital chief about the restructuring of its IT capabilities. Read the issue now.
Posted: 12 Jul 2021 | Published: 13 Jul 2021

ComputerWeekly.com

Adapt ITSM workflows for modern IT needs
sponsored by SearchITOperations
EBOOK: ITSM workflows help an organization pull together services from myriad systems into a semblance of order -- even as IT shops transform themselves into cloud-based and DevOps-focused operations. Open up this handbook to learn more.
Posted: 04 May 2021 | Published: 04 May 2021

1 - 25 of 445 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences