Application RequestWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Request returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Application Lifecycle Management(ALM)
 •   Network Management
 •   Change and Configuration Management
 •   Enterprise Systems Management
 •   Data Center Management
 •   Service Oriented Architecture (SOA)
 •   Information Lifecycle Management
 •   Networks

Related Searches
 •   Application Backups
 •   Application Definitions
 •   Application Request E-Commerce
 •   Application Request History
 •   Application Request Impact
 •   Application Request Implementation
 •   Application Request Provider
 •   Directories Application Request
 •   Provider Application Request
 •   Testing Application
Advertisement

ALL RESULTS
1 - 25 of 489 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

EdgePlatform for Application Acceleration and Delivery by Akamai Technologies

The Akamai EdgePlatform is a purpose built Application Delivery Network that accelerates delivery of applications and content over the Internet, which can lead to increased usage, adoption and improved productivity. 
(SOFTWARE PRODUCT)

Business Mashups: Addressing the Long Tail of Applications Development by SERENA Software, Inc.

December 2007 - (Free Research)
A mashup is a web application that combines data from more than one source into a single integrated tool. Learn how Business Mashups can help Business Owners and IT unlock the potential found in this so-called "long tail" of applications. 
(WHITE PAPER) READ ABSTRACT |

Constellation Energy Group by EMC Corporation

June 2008 - (Free Research)
In its quest to fully leverage the new technologies, Constellation energy realized it needed to integrate them to one another, as well as integrate them with other business processes and applications. 
(WHITE PAPER) READ ABSTRACT |

Riverbed Stingray Traffic Manager VA Performance on vSphere 4 by Riverbed Technology, Inc.

January 2012 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can benefit from load balancers that connect users to the most suitable datacenter. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

Epicor's IT Service Management - Expert IT Help Desk Software by Epicor Software Corporation

 
(SOFTWARE PRODUCT)

Convert IBM Cloud image parameters into Java using JAXB: JAXB and Plain Old Java Objects morph XML cloud image parameters in usable Java code by IBM

July 2011 - (Free Research)
Get under the hood:  This technical note describes how to transform XML response into a Java™-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes. 
(WHITE PAPER) READ ABSTRACT |

Developer Issue Tracker by BlackBerry

May 2010 - (Free Research)
Through Developer Issue Tracker, BlackBerry® developers can understand what issues exist in the market today, the potential workarounds and timelines for fixing those issues. 
(ASSESSMENT TOOL)

For Data Center Virtualization, IOPS is More Important Than Air by BlueArc Corp.

November 2010 - (Free Research)
IOPS, or Input Output operations Per Second, are one of the key barometers to how well your storage is performing. Until the widespread adoption of server virtualization, high IOPS haven't typically been a requirement for the more typical data center "workhorse" applications. Read on to learn more about how to manage this vital resource. 
(WHITE PAPER) READ ABSTRACT |

Increasing Operational Efficiency: enabling end-to-end change by CA Technologies.

September 2010 - (Free Research)
Development and change within the IT infrastructure can be a very demanding and frustrating task. Access this exclusive resource now to learn the value of an automated and centralized end-to-end change management application. 
(ANALYST BRIEF) READ ABSTRACT |

Understanding ITIL® Service Portfolio Management: An Approach For Implementing Effective Service Lifecycle Management by BMC Software, Inc.

June 2009 - (Free Research)
IT executives and their teams need a comprehensive and accurate view of IT services. A service catalog includes all relevant details about your services, including which service level agreements (SLAs) are associated with it, who is able to request it, how much it costs, and how to fulfill it. This paper describes the IT Infrastructure... 
(WHITE PAPER) READ ABSTRACT |

Thor Technologies, Inc.: Xellerate®, Secure Enterprise Provisioning System Integrates with RSA ClearTrust® to Provide Enhanced User Management by RSA, The Security Division of EMC

June 2004 - (Free Research)
Xellerate®, combined with RSA ClearTrust® software, provides a comprehensive solution that delivers centralized authentication and secure access management as well as user self-service and workflow capabilities. 
(CASE STUDY) READ ABSTRACT |

Optiview Network Analyzer -- Free Hardware Trial by Fluke Networks

February 2009 - (Free Research)
IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection. 
(PRODUCT DEMO)

Provergent Suite - Telecom Order & Inventory Software by Digital Fairway, Inc.

The Provergent Communication Asset Management Suite helps to manage the planning, procuring, provisioning, auditing & delivering of communications services. Provergent allows you to build accurate & easy to manage centralized inventories, backed up by automated provisioning processes to manage all moves, adds, changes & deletes in the inventory. 
(SOFTWARE PRODUCT)

RSD Glass for eDiscovery Readiness by RSD

October 2011 - (Free Research)
Read this white paper to learn about a way to policy-manage and align correct levels of accessibility, protections and retention in your eDiscovery requests and content. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Unlocking the value in SAP Solution Manager by Cisco Systems, Inc.

December 2010 - (Free Research)
In this e-book, readers will learn how to uncover the value in Solution Manager, and use the tool not only to benefit IT operations, but help advance business goals as well. 
(EBOOK)

Release Management: Closing the Gap in Application Lifecycle Management by SERENA Software, Inc.

January 2011 - (Free Research)
Businesses are struggling to keep up with the massive amount of change to their software applications. By strategically automating release management, companies can create a crisp, accurate Release Management function that dramatically boosts the competitive edge gained from application change. Control application change or let it control you. 
(WHITE PAPER) READ ABSTRACT |

Cricket Communications Turns to Splunk for Assuring Automated Service Management by Splunk

February 2012 - (Free Research)
Keeping up with a quickly expanding business is difficult if you do not have the right tools. Read on to learn how Cricket Communications handled its growing business' operations with an enterprise application, data and operational management system. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of an Archiving Project White Paper by IBM

August 2011 - (Free Research)
Companies worldwide are affirming the value of archiving as a best practice for managing data growth, completing faster application upgrades and much more. Inside this white paper, learn how archiving can help support data retention compliance initiatives and mitigate risk for audits and electronic discovery requests. 
(WHITE PAPER) READ ABSTRACT |

Gartner: Deploying iPads on the corporate network by ComputerWeekly.com

March 2012 - (Free Research)
Tim Zimmerman, Gartner research director offers some practical advice to organisations wanted to use iPads on their corporate wireless networks. 
(ANALYST BRIEF) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by Veracode, Inc.

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

Chalk Talk: Simplify User Access with NetIQ Solutions by NetIQ

April 2014 - (Free Research)
View this webcast to learn about an access management solution that offers self-service capabilities to eliminate time-consuming phone calls and paperwork to gain necessary access to critical business applications. 
(WHITE PAPER) READ ABSTRACT |

IBM Tivoli Service Request Manager White Paper by IBM

January 2010 - (Free Research)
This IBM white paper will show you how you can help your organization manage incidents and problems, restore critical services, and minimize service desk calls in this white paper. 
(WHITE PAPER) READ ABSTRACT |

CORE IMPACT Pro V10 by Core Security Technologies

December 2009 - (Free Research)
Please join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications. 
(PRODUCT DEMO) READ ABSTRACT |

Stingray Traffic Manager Virtual Appliance Performance on vSphere 4 by Riverbed Technology, Inc.

November 2011 - (Free Research)
Cloud infrastructure platforms like VMware vSphere 4.0 can significantly benefit from load balancers that connect users to the most suitable data center. This white paper outlines how the Riverbed Stingray Traffic Manager Virtual Appliance (VA) improves traffic performance figures compared to a Linux install. 
(WHITE PAPER) READ ABSTRACT |

Streamlining Access Control for SAP® Systems: The Many Advantages of Automated User Provisioning by Security Weaver

September 2008 - (Free Research)
For organizations with high-volumes of employees leveraging SAP solutions, managing access is a complex undertaking. This paper examines the access control challenges and reveals the many advantages of automated user provisioning for SAP solutions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 489 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts