Related ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Related Application returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Data Security
 •   Application Lifecycle Management(ALM)
 •   Virtualization
 •   Wireless Security
 •   Application Management and Maintenance
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Enterprise Content Management (ECM)
 •   Intrusion Prevention Solutions
 •   Business Intelligence Solutions

Related Searches
 •   Buy Related
 •   Functions Of Related Application
 •   Networks Related Application
 •   Notes Related Application
 •   Related Application Implementation
 •   Related Application Mac
 •   Related Application Records
 •   Related Flow
 •   Related Implementing
 •   Tutorials Related Application
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Sybase IQ 15: Addressing the Need for Speed by Sybase, an SAP company

August 01, 2009 - (Free Research)
Bill Jacobs, Director of Technical Marketing, Sybase IQ, discusses the speed and performance capabilities of Sybase IQ 15. These enhancements are designed to help make IQ 15 remain the smartest choice for analytic, reporting, business intelligence, data mining, and related applications. 
(WEBCAST) READ ABSTRACT |

The Total Economic Impact of Lumension Security's Sanctuary by Lumension

September 2007 - (Free Research)
Lumension&#39s Sanctuary Application and Device Control is an IT-driven solution that automatically enforces endpoint security policies. The financial impact of moving from a &#34voluntary&#34 compliance solution to an &#34automatic&#34 one is illustrated 
(WHITE PAPER) READ ABSTRACT |

Protecting SQL Server in Physical and Virtual Environments by Marathon Technologies

October 2008 - (Free Research)
This paper discusses the different causes of both planned and unplanned downtime along with some important considerations for evaluating solutions to address them. 
(WHITE PAPER) READ ABSTRACT |

WAN Governance Executive Primer by IPANEMA TECHNOLOGIES

February 2010 - (Free Research)
Read this paper to learn the complexity of managing WAN traffic is increasing, organizations need more capabilities for optimizing application performance than just WAN acceleration. 
(WHITE PAPER) READ ABSTRACT |

SonicWALL TZ Series by SonicWALL

February 2011 - (Free Research)
Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls. 
(WHITE PAPER) READ ABSTRACT |

Native XML Management with Documentum by EMC Corporation

July 2003 - (Free Research)
This paper is intended to describe how Documentum manages XML content. 
(WHITE PAPER) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Security Best Practices for Developing Windows Azure Applications by Microsoft

November 2010 - (Free Research)
Are you a software designer, architect, developer or tester interested in secure cloud computing solutions?  Download this breakthrough paper focusing on the security challenges and recommended approaches to design and develop more secure applications for Microsoft's Windows Azure platform.  
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials: Module 1 - Security Architecture by Microsoft

December 2010 - (Free Research)
In this video module, Graham Calladine, Security Architect with Microsoft Services partners with the Security Talk Series to describe the security features of the Windows Azure platform, resources available to protect applications and data running on the Microsoft cloud and SQL Azure security and authentication options. 
(WEBCAST) READ ABSTRACT |

Enterprise Strategies to Improve Application Testing: Optimized Test Environments Speed the Deployment of Reliable Applications by IBM

March 2008 - (Free Research)
Princeton Softech Optim™ enables IT organizations to meet even the most complex application testing challenge by providing all the fundamental components of an effective test data management strategy. 
(WHITE PAPER)

The Network Evolution University: Next Generation Networks by SearchNetworking.com

November 2011 - (Free Research)
In order to combat the ever-evolving challenges of today’s networks, it’s time to head back to school in our exclusive Network Evolution University – Featuring three distinct classes and nine progressive learning lessons that explore all there is to know about next generation networks and how to overcome the challenges they present. 
(VIRTUAL SEMINAR) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Windows Azure Platform Security Essentials for Business Decision Makers by Microsoft

November 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. Watch this video to learn more! 
(VIDEO) READ ABSTRACT |

The Importance of Network Time Synchronization by Symmetricom

October 2009 - (Free Research)
This paper explains why accurate network time -- and therefore precise network time synchronization -- is critically important for network management. Read on to learn more about the importance of network time synchronization. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

BPM Projects: What You Need to Know by IBM

November 2013 - (Free Research)
While business process management (BPM) can offer improved efficiency and cost savings, many people can be resistant to change, especially when it comes to alterations of roles, status, or priorities. In this expert e-guide, Gartner VP and distinguished analyst Tina Nunno explains how to avoid four main change-related pitfalls of BPM projects. 
(EGUIDE) READ ABSTRACT |

Webinar: 20 Critical Controls for Cyber Defense by ISACA

June 2014 - (Free Research)
Join ISACA for a webinar hosted by internationally recognized speaker, Dr. Vilius Benetis, on Tuesday, June 24, 2014 at 12:00 PM EDT (16:00 UTC), who will discuss the 20 critical controls identified by SANS and the Council on Cybersecurity. 
(WEBCAST) READ ABSTRACT |

The Forrester Wave™: Hybrid2 Integration, Q1 2014 by MuleSoft

February 2014 - (Free Research)
Today's increasingly complex application landscape calls for new hybrid integration strategies, as businesses  must integrate on-premise and cloud-based applications. In this report from Forrester Research, Inc., see how 14 top middleware providers stack up against 51 criteria related to hybrid integration. 
(ANALYST REPORT) READ ABSTRACT |

Growing Market Share in a Highly Competitive Financial Services Industry by Keynote Systems

January 2004 - (Free Research)
Financial services organizations strive to retain existing customers and attract new ones, many are introducing new, enhanced services over the Web. Ensure you are providing the best possible experience by focusing your SLM processes on the end user. 
(WHITE PAPER) READ ABSTRACT |

Optimizing Video Performance Across the Distributed Enterprise by BlueCoat

October 2010 - (Free Research)
Do more with less: that’s the message echoing through corporate cultures today. One clear target is to contain costs, especially travel-related costs, which can be large enough to have a serious impact on bottom lines. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Oracle + Sun Product Strategy Webcast Series - Sun Blade Systems by Oracle Corporation

March 2011 - (Free Research)
These informative, on-demand sessions offer strategies for Sun's major product lines related to the combination, explain how Oracle will deliver more innovation to our customers, and outline our approach to protecting customers' investments. This webcast will provide you with an overview of the Oracle Sun Blade Server product line. 
(WEBCAST) READ ABSTRACT |

Troubleshooting Performance in Virtualized Application Delivery Architectures by Riverbed Technology, Inc.

September 2013 - (Free Research)
This Enterprise Management Associates® (EMA™) white paper reviews the key challenges and requirements for performance management specifically related to Citrix XenApp deployments and examines the Riverbed Performance Management solution in that light. 
(WHITE PAPER) READ ABSTRACT |

Information Security Essential Guide: Strategies for Tackling BYOD by SearchSecurity.com

May 2013 - (Free Research)
Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more. 
(WHITE PAPER) READ ABSTRACT |

10 Places SAP Customers Can Reduce Data Management Costs by Winshuttle, LLC

December 2008 - (Free Research)
This white paper highlights 10 key places SAP customers can reduce IT operational costs, with a focus on trimming support and data entry costs by automating data entry. 
(WHITE PAPER) READ ABSTRACT |

Oracle and F5 Reference Architechture for SOA by F5 Networks

September 2008 - (Free Research)
This document details a solution blueprint developed by F5 and Oracle. It's purpose is to show how F5 and Oracle components work together to deliver a highly reliable and scalable platform for deploying Oracle Service Oriented Applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts