Application VirginiaWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Application Virginia returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Endpoint Security
 •   Virtualization
 •   Wireless Security
 •   Mobile Device Management
 •   Application Management and Maintenance
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Technology ROI Tools
 •   Data and Application Distribution
 •   Storage Management

Related Searches
 •   Application Framework
 •   Application Issues
 •   Application Virginia Functions
 •   Application Virginia Professional
 •   Media Application
 •   Monitor Application
 •   Network Application
 •   Online Application Virginia
 •   Order Application Virginia
 •   Technologies Application Virginia
Advertisement

ALL RESULTS
1 - 25 of 495 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

College Board Case Study: Quality Software is Secure Software by IBM

July 22, 2013 - (Free Research)
In this informative webcast, learn about the application security tool that West Virginia University uses to identify vulnerabilities in web applications, reducing the risk of a data breach and keeping sensitive student data safe. 
(WEBCAST) READ ABSTRACT |

Benefit Solution Case Study - Timmons Group by EMC Corporation

April 2008 - (Free Research)
Timmons Group is a leader in the civil engineering industry; however, their storage requirements were growing at an unprecedented pace. Read this case study to learn how this company was able to overcome their challenges with innovative SAN solutions. 
(WHITE PAPER) READ ABSTRACT |

Cisco: Scaling Application Vulnerability Management Across the Enterprise by IBM

February 2013 - (Free Research)
This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost. 
(WHITE PAPER) READ ABSTRACT |

Discovering Vulnerable Web Applications by Qualys

August 2012 - (Free Research)
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Selecting a Web Application Scanning (WAS) Solution by Qualys

May 2013 - (Free Research)
This informative guide explores best practices for choosing a Web application scanning solution. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution – April 2014 by SearchNetworking.com

April 2014 - (Free Research)
In this issue of Network Evolution, find out how APM vendors are focusing on network visibility. We also explore 802.11ac's bandwidth demands and video conferencing drivers. 
(EZINE) READ ABSTRACT |

Third Party Applications: A Chink in Your Armour by Lumension

April 2014 - (Free Research)
This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management. 
(WEBCAST) READ ABSTRACT |

The Next Generation in Application Monitoring by Hewlett-Packard Limited

May 2012 - (Free Research)
Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows Mobile on Any Device by Citrix

September 2013 - (Free Research)
Learn how to centralize and virtualize Windows business apps and desktops in the datacenter to provide consistent, secure access from any type of device. 
(WHITE PAPER) READ ABSTRACT |

Deploying Cloud Applications on PaaS: What to Consider by SearchSoftwareQuality.com

July 2013 - (Free Research)
Platform as a Service (PaaS) technologies are moving on up – all the way up. In this guide, you'll find key considerations for deploying cloud applications on PaaS platforms. 
(EBOOK) READ ABSTRACT |

Automating your Microsoft World: Application Efficiencies by N-able Technologies

October 2013 - (Free Research)
Watch this exclusive video to learn how to leverage an automation manager tool to streamline the performance of key Microsoft applications. 
(WEBCAST) READ ABSTRACT |

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com

October 2013 - (Free Research)
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security. 
(EBOOK) READ ABSTRACT |

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva

April 2014 - (Free Research)
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool. 
(EGUIDE) READ ABSTRACT |

Going Beyond MDM: Mobile App Management, Why We Need It, and How It Works by Dell Software

February 2014 - (Free Research)
In part 3 of this exclusive e-book, Jack Madden explains what really goes into creating a successful MDM program, including the core elements of mobile application management (MAM). 
(WHITE PAPER) READ ABSTRACT |

Application Performance for Oil and Gas Seismic Analysis by Dot Hill Systems Corp.

March 2014 - (Free Research)
The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications. 
(WHITE PAPER) READ ABSTRACT |

Software Defined Application Services by F5 Networks

October 2013 - (Free Research)
In this white paper, discover an elastic, fabric-based, next-generation model for delivering critical application services. Learn how you can effectively create and provision application services across the data center and into the cloud, based on the needs of your users. 
(WHITE PAPER) READ ABSTRACT |

MS Learning & Consulting Cuts Redeployment Time by ZeroTurnaround

December 2013 - (Free Research)
In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management. 
(CASE STUDY) READ ABSTRACT |

Deliver Application Services Without Constraints by F5 Networks

November 2013 - (Free Research)
Modern organizations need to develop and deliver applications in a timely, secure manner. Unfortunately, network architectures just haven't kept up with the rapid pace of application change, making app delivery time-consuming, costly, and resource-intensive. In this white paper, discover how to overcome these constraints with a new delivery model. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows mobile on any device by Citrix

June 2013 - (Free Research)
This exclusive white paper examines how you can virtualize Windows business applications and desktops in the data center and deliver high-performing, secure access to them from any type of mobile device, over any network connection. Read on to learn how you can take Windows mobile. 
(WHITE PAPER) READ ABSTRACT |

Five reasons why mobilizing Windows applications is simpler than you think by Citrix

March 2013 - (Free Research)
In this white paper, uncover five myths about Windows application development and learn how your company can go mobile with relative ease. 
(WHITE PAPER) READ ABSTRACT |

A CIO's Roadmap to The Cloud: Start with Critical Business Applications and Silence the Naysayers by Genesys

March 2014 - (Free Research)
The benefits of cloud computing can he heard everywhere: lower costs, greater efficiency, increased flexibility. So even though you may want to move to the cloud, the question for CIOs remains: how do you know when (or if) to move mission-critical applications to the cloud? 
(WHITE PAPER) READ ABSTRACT |

What Developers Want: The End of Application Redeploys by ZeroTurnaround

March 2014 - (Free Research)
For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs. 
(WHITE PAPER) READ ABSTRACT |

Design, Deploy, and Manage a DDoS Protection Architecture by F5 Networks

November 2013 - (Free Research)
An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Application Portfolio Management by SearchSoftwareQuality.com

July 2013 - (Free Research)
In this handbook, find best practices in the daunting world of application portfolio management. Get the basics on building a business case for APM—as well as tips on measuring the financial benefit of each application. 
(EGUIDE) READ ABSTRACT |

Setting the Foundation for Exceptional Performance by Neustar®

April 2012 - (Free Research)
Join Neustar’s performance expert as he discusses how to set the stage for performance. In this informative webcast you will learn about: foundations of web performance; getting to stability; building high performance systems; and high quality operations. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 495 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts