Formats applicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Formats application returned the following results.
RSS What is RSS?
Related Categories

 •   Application Lifecycle Management(ALM)
 •   Application Management and Maintenance
 •   Application Integration
 •   Availability, Performance and Problem Management
 •   Software Configuration Management (SCM)

Related Searches
 •   Balancing Formats
 •   Formats Audit
 •   Formats Documentation
 •   Formats Flow
 •   Formats Network
 •   Formats application Reports
 •   Help Formats application
 •   Internet-Based Formats application
 •   Practices Formats
 •   Productivity Formats application
Advertisement

ALL RESULTS
1 - 25 of 496 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

What are Patterns of Expertise? by IBM

August 07, 2012 - (Free Research)
Watch this brief video to learn how patterns of expertise -- actual applications including CRM, ERP, and business analytics -- are optimized to offer faster time-to-value, lower cost, and increase performance. 
(VIDEO) READ ABSTRACT |

Cisco: Scaling Application Vulnerability Management Across the Enterprise by IBM

February 28, 2013 - (Free Research)
This case study reveals the solution that one organization chose to help improve application security testing efficiencies at a reduced cost. 
(WHITE PAPER) READ ABSTRACT |

Discovering Vulnerable Web Applications by Qualys

August 31, 2012 - (Free Research)
This paper describes how large enterprises can effectively discover, catalog and scan web applications to control vulnerabilities as part of their organization's overall vulnerability management program. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Selecting a Web Application Scanning (WAS) Solution by Qualys

May 16, 2013 - (Free Research)
This informative guide explores best practices for choosing a Web application scanning solution. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution – April 2014 by SearchNetworking.com

April 01, 2014 - (Free Research)
In this issue of Network Evolution, find out how APM vendors are focusing on network visibility. We also explore 802.11ac's bandwidth demands and video conferencing drivers. 
(EZINE) READ ABSTRACT |

Third Party Applications: A Chink in Your Armour by Lumension

April 15, 2014 - (Free Research)
This webcast sheds light on the prevalence of third party application vulnerabilities. View now for key tips from industry leaders on how to reduce these risks with optimum patch management. 
(WEBCAST) READ ABSTRACT |

The Next Generation in Application Monitoring by Hewlett-Packard Limited

May 31, 2012 - (Free Research)
Access this resource to discover the 3 major components to application security that will best keep your assets protected across the network. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows Mobile on Any Device by Citrix

September 25, 2013 - (Free Research)
Learn how to centralize and virtualize Windows business apps and desktops in the datacenter to provide consistent, secure access from any type of device. 
(WHITE PAPER) READ ABSTRACT |

Deploying Cloud Applications on PaaS: What to Consider by SearchSoftwareQuality.com

July 25, 2013 - (Free Research)
Platform as a Service (PaaS) technologies are moving on up – all the way up. In this guide, you'll find key considerations for deploying cloud applications on PaaS platforms. 
(EBOOK) READ ABSTRACT |

Automating your Microsoft World: Application Efficiencies by N-able Technologies

October 01, 2013 - (Free Research)
Watch this exclusive video to learn how to leverage an automation manager tool to streamline the performance of key Microsoft applications. 
(WEBCAST) READ ABSTRACT |

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com

October 21, 2013 - (Free Research)
This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security. 
(EBOOK) READ ABSTRACT |

Using Free Web Application Security Scanning Tools to Secure Web Apps by Imperva

April 07, 2014 - (Free Research)
Expert Michael Cobb sheds light on the true benefits of a zero-cost, open source Web application security scanning tool. 
(EGUIDE) READ ABSTRACT |

Going Beyond MDM: Mobile App Management, Why We Need It, and How It Works by Dell Software

February 12, 2014 - (Free Research)
In part 3 of this exclusive e-book, Jack Madden explains what really goes into creating a successful MDM program, including the core elements of mobile application management (MAM). 
(WHITE PAPER) READ ABSTRACT |

Application Performance for Oil and Gas Seismic Analysis by Dot Hill Systems Corp.

March 14, 2014 - (Free Research)
The reference solution combines Dot Hill storage solutions, Intel Enterprise Edition for Lustre, and Mellanox Infiniband to deliver a highly scalable and high performance infrastructure for oil exploration computing platforms, as well as other HPC applications. 
(WHITE PAPER) READ ABSTRACT |

Software Defined Application Services by F5 Networks

October 31, 2013 - (Free Research)
In this white paper, discover an elastic, fabric-based, next-generation model for delivering critical application services. Learn how you can effectively create and provision application services across the data center and into the cloud, based on the needs of your users. 
(WHITE PAPER) READ ABSTRACT |

MS Learning & Consulting Cuts Redeployment Time by ZeroTurnaround

December 31, 2013 - (Free Research)
In this case study, learn how MS Learning & Consulting was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management. 
(CASE STUDY) READ ABSTRACT |

Deliver Application Services Without Constraints by F5 Networks

November 30, 2013 - (Free Research)
Modern organizations need to develop and deliver applications in a timely, secure manner. Unfortunately, network architectures just haven't kept up with the rapid pace of application change, making app delivery time-consuming, costly, and resource-intensive. In this white paper, discover how to overcome these constraints with a new delivery model. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows mobile on any device by Citrix

June 14, 2013 - (Free Research)
This exclusive white paper examines how you can virtualize Windows business applications and desktops in the data center and deliver high-performing, secure access to them from any type of mobile device, over any network connection. Read on to learn how you can take Windows mobile. 
(WHITE PAPER) READ ABSTRACT |

Five reasons why mobilizing Windows applications is simpler than you think by Citrix

March 11, 2013 - (Free Research)
In this white paper, uncover five myths about Windows application development and learn how your company can go mobile with relative ease. 
(WHITE PAPER) READ ABSTRACT |

A CIO's Roadmap to The Cloud: Start with Critical Business Applications and Silence the Naysayers by Genesys

March 12, 2014 - (Free Research)
The benefits of cloud computing can he heard everywhere: lower costs, greater efficiency, increased flexibility. So even though you may want to move to the cloud, the question for CIOs remains: how do you know when (or if) to move mission-critical applications to the cloud? 
(WHITE PAPER) READ ABSTRACT |

What Developers Want: The End of Application Redeploys by ZeroTurnaround

March 31, 2014 - (Free Research)
For developers, turnaround time due to application redeployments and restarts after code changes is a huge waste of time. In this white paper, discover how you can eliminate the need to redeploy Java applications after making code changes, including while adding new features or fixing bugs. 
(WHITE PAPER) READ ABSTRACT |

Design, Deploy, and Manage a DDoS Protection Architecture by F5 Networks

November 30, 2013 - (Free Research)
An increasing number of Distributed Denial-of-service (DDoS) attacks has caused many businesses to redesign their networks and better protect application-layer attacks. In this white paper, learn how a multi-tier DDoS protection architecture can help you protect your network and higher-layer application protocols from the four categories of DDoS. 
(WHITE PAPER) READ ABSTRACT |

Cisco Wide Area Applications Services (WAAS) Report by Cisco Systems, Inc.

October 01, 2006 - (Free Research)
Learn how Cisco Wide Area Application Services (WAAS) can accelerate a range of business applications, including Microsoft Exchange, file sharing and web applications. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Application Portfolio Management by SearchSoftwareQuality.com

July 17, 2013 - (Free Research)
In this handbook, find best practices in the daunting world of application portfolio management. Get the basics on building a business case for APM—as well as tips on measuring the financial benefit of each application. 
(EGUIDE) READ ABSTRACT |

Setting the Foundation for Exceptional Performance by Neustar®

April 25, 2012 - (Free Research)
Join Neustar’s performance expert as he discusses how to set the stage for performance. In this informative webcast you will learn about: foundations of web performance; getting to stability; building high performance systems; and high quality operations. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 496 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts