IT Management  >   Systems Operations  >   Applications Management  >  

Application Monitoring

RSS Feed   
ALSO CALLED: Applications Monitoring
DEFINITION: The process of detecting and reporting problems with the proper operation of an application.
Application Monitoring Reports
1 - 25 of 265 Matches Previous Page  |  Next Page
Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Accelerator for O365
sponsored by Riverbed
DATA SHEET: Network inhibitors such as latency, congestion and the unpredictability of dynamic workforces can greatly impact the user experience of Microsoft O365, effectively lowering the ROI enterprises can expect from major investments in this valuable collaboration suite. Read this data sheet to learn how you may be able to find relief.
Posted: 16 Oct 2020 | Published: 31 Jul 2020

Riverbed

VMware NSX Advanced Load Balancer
sponsored by VMware
ANALYST REPORT: Do you experience major fluctuations in internet traffic? Instead of purchasing, installing, and supporting appliance-based load balancers to direct your organization’s web traffic, you can turn to a software-defined solution. Dive into this report to read the science behind VMware’s NSX Advanced Load Balancer.
Posted: 14 Oct 2020 | Published: 30 Apr 2020

VMware

Why 2 Clouds Are Better Than 1 For ISVs
sponsored by SoftServe
WHITE PAPER: Today, organizations are increasingly shifting focus to software that’s supported across multiple public cloud platforms, which digital consulting company, SoftServe, calls Parallel Platforming. Learn about Parallel Platforming and how it’s helped ISVs so far in this white paper.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

SoftServe

4 Ways to Boost Remote Worker Productivity
sponsored by Riverbed
WHITE PAPER: 74% of companies plan to permanently shift to more remote work even after the COVID-19 restrictions are lifted. This means that businesses will have to face the networking challenges that come with long-term remote work. Read this white paper to explore these challenges and why it’s important to address them.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Riverbed

Leading the Way with Secure Mobile Keyless Hotel Access
sponsored by Armor
CASE STUDY: The Trustwave Global Security Report lists the hospitality industry as one of the top five industries subjected to network breaches. Customer data is sensitive but attainable for threat actors, and developers must use caution when developing keyless hotel access. Read this case study to learn how one business balanced usability and security.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Armor

Rethink Firewalls: The Compelling Economic Case for Software-Based Segmentation
sponsored by Guardicore
WHITE PAPER: Why are IT and security teams still relying on legacy firewalls to do internal network segmentation? As policy-protected applications and segments proliferate, physical firewall appliances are proving ineffective in today’s increasingly dynamic hybrid-cloud environments. Read this white paper to learn about software-based segmentation.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Guardicore

11-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta

Automating a Menu of OpenShift Networking Services
sponsored by F5 Networks
WEBCAST: Delivering Kubernetes networking requires choosing from a complicated menu of services and requirements. In this webcast, listen as Eric Chen, Rick Salsa and Cameron Skidmore discuss how F5 and Red Hat use automation to make delivery of your Red Hat OpenShift Container Platform network easier.
Posted: 28 Sep 2020 | Premiered: Sep 28, 2020

F5 Networks

Accelerating Application Refactoring
sponsored by CAST Software
WHITE PAPER: Open this guide to learn how some of the most essential application refactoring activities can be accelerated by applying software intelligence.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

CAST Software

Application Security with NGINX
sponsored by NGINX
WEBCAST: In today’s unpredictable security environment, organizations need to know how to implement effective security controls for their application infrastructure without impacting release velocity or application performance. In this webcast, learn how you can do just this, with specific business use cases as evidence.
Posted: 15 Sep 2020 | Premiered: Aug 5, 2020

NGINX

Real World SD-WAN: Gaining Agility, Enhancing CX & EX, and Cutting Costs
sponsored by Comcast Business
WHITE PAPER: SD-WAN is one of the fastest growing enterprise technologies, with adoption projected to grow at ~30% annually. The benefits of this technology have been widely communicated, and now, the onus lies on IT to capitalize. Read this white paper to view real-world success stories on SD-WAN and how it has improved productivity and cut costs.
Posted: 15 Sep 2020 | Published: 18 Aug 2020

Comcast Business

Application Paranoia
sponsored by HCL Software
AUDIO FILE: In episode 9 of Application Paranoia, the hosts discuss how “open” the devices we use really are at an application level, explain why prepared statements are better than executing queries, and interview a security director of application security at a large multinational organization.Access it here.
Posted: 09 Sep 2020 | Published: 17 Aug 2020

HCL Software

What Every Security Professional Should Know About Third-Party OAuth Apps
sponsored by Proofpoint
WHITE PAPER: For CISOs, permitting third-party apps is a constant struggle, especially given the expansive use of cloud applications. What’s important is that security professionals in authentication are up to speed on what keeps a cloud account safe from OAuth attacks. Take a look at this FAQ/checklist to be informed on the risks of third-party apps.
Posted: 08 Sep 2020 | Published: 03 Sep 2020

Proofpoint

Case Study: amaysim Expands Its Telecommunications Business With Help From New Relic
sponsored by New Relic
CASE STUDY: Telecommunications companies operate a myriad of scripts and processes, written in a range of languages. This code complexity means that errors and outages may be difficult to isolate, and without end-to-end visibility, customer experience is put at risk. Immerse yourself in this case study demonstrating how uptime and CX can be improved.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

New Relic

Nexus Innovator: David Radford-Grant of Achievers
sponsored by Sonatype
CASE STUDY: DevOps can be challenging to manage and secure, but Nexus development tools are able to provide immediately recognizable benefits to organizations. It delivers high availability without intermittent outages or exorbitant pricing. Read this case study about an employee at an company called Achievers to learn more about the utility it can provide.
Posted: 01 Sep 2020 | Published: 16 Jan 2020

Sonatype

Business observability vs application monitoring: What’s the difference?
sponsored by New Relic
WHITE PAPER: As DevOps has matured, 2 terms have been circulating: business observability and application monitoring. While the 2 have significant overlap, there are some key differences that set them apart. In this article, learn what exactly defines observability and monitoring, and how these two approaches are helping with the rise of DevOps and automation.
Posted: 31 Aug 2020 | Published: 19 Dec 2019

New Relic

Product Video: Enterprise Application Access
sponsored by Akamai Technologies
VIDEO: With remote work at an all-time high, it’s critical that only the correct users get access to the right applications at the right time. Now, this can be done without granting a user full access to a network. How? By integrating tools such as MFA, SSO and identity onto one secure access platform. Watch this video to get a closer look.
Posted: 18 Aug 2020 | Premiered: 18 Aug 2020

Akamai Technologies

SIG - Farm Credit Customer Story
sponsored by Cisco Umbrella
CASE STUDY: Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

Webinar: Application Fluency through Automated SD-WAN
sponsored by Oracle Communications
WEBCAST: How can software-defined networking optimize network architecture to enhance application performance? This Doyle Research webcast, presented by Oracle, gives an overview of SD-WAN and how it helps you get the most out of your mission-critical apps.
Posted: 08 Jul 2020 | Premiered: Jul 8, 2020

Oracle Communications

ITProTV | CompTIA PenTest+: Analyze Scripts: Python
sponsored by Cornerstone OnDemand
VIDEO: This video will walk you through how to analyze Python scripts for the CompTIA PenTest+: and will explain the foundational knowledge of Python so that you are better equipped to write scripts and analyze and discern the purpose of scripts you come into contact with. Tune in to start your test prep.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cornerstone OnDemand

How to Take Infrastructure Monitoring to the Next Level
sponsored by New Relic
WHITE PAPER: You need observability to help you manage your modern environments. Access this white paper to discover the four imperatives for today’s DevOps and SRE teams to achieve true observability.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

New Relic

Why DevOps Teams Lack Visibility in Distributed Environments
sponsored by New Relic
WHITE PAPER: Open this white paper to learn how to immediately answer the most important questions that arise when experiencing downtime in your infrastructure.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

New Relic

A Redefined Approach to Application Monitoring
sponsored by Splunk
WHITE PAPER: Aberdeen research has found that when leading organizations adopt modern APM tools,DevOps teams can gain deeper and faster insights into their applications so they can troubleshoot and prevent issues before they impact end users. Access this white paper to learn how.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Splunk

Smart strategies for application monitoring in the cloud
sponsored by SearchCloudComputing.com
EBOOK: Application monitoring lets you know what's happening with workloads running in the public cloud. A sound application monitoring strategy informs you about how apps perform, how secure they are and how much they cost to run.
Posted: 01 Jun 2020 | Published: 01 Jun 2020

SearchCloudComputing.com
1 - 25 of 265 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info