Solutions ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Solutions Application returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Application Lifecycle Management(ALM)
 •   Wireless Security
 •   Enterprise Information Integration/ Metadata Management
 •   Business Intelligence Solutions
 •   Data Security
 •   Application Security
 •   Business Process Management (BPM)
 •   Application Integration
 •   Data and Application Distribution

Related Searches
 •   Contacts Solutions
 •   E-Commerce Solutions Application
 •   Improvements Solutions Application
 •   Solutions Application Database
 •   Solutions Application Management
 •   Solutions Application Manufacturer
 •   Solutions Application Warehouse
 •   Solutions Planner
 •   Solutions Schedule
 •   Usa Solutions Application
Advertisement

ALL RESULTS
1 - 25 of 500 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Microsoft .NET Framework and BlackBerry Applications by BlackBerry

March 2009 - (Free Research)
This whitepaper provides a technical overview of how organizations can leverage Microsoft development tools and Microsoft .Net framework to create applications for the BlackBerry®platform. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

Improve Business Agility with Cisco Application Delivery Network Solution by Cisco Systems, Inc.

April 2008 - (Free Research)
Cisco ADN can help your organization improve business agility and lower application-delivery costs. 
(WHITE PAPER) READ ABSTRACT |

Requirements Management Redefined by Jama Software

December 2009 - (Free Research)
Requirements management is critical to the success of a project but can be a pain to fully implement. Read this paper to find out what is really required to be successful at requirements management and how requirements management is being redefined to provide a faster, easier, more collaborative way to ensure project success. 
(WHITE PAPER) READ ABSTRACT |

Informatica Ultra Messaging by Informatica

December 2010 - (Free Research)
Legacy messaging technologies lack the performance and flexibility necessary to support today’s computing environments. Attend this webinar to learn how Informatica’s Ultra Messaging technology can help realize up to 10x performance improvements over legacy messaging solutions while dramatically reducing costs and improving deployment flexibility. 
(WEBCAST) READ ABSTRACT |

IBM WebSphere eXtreme Scale and WebSphere DataPower XC10 Appliance by IBM

July 2010 - (Free Research)
Learn how elastic caching solutions in your distributed environment can empower the application performance you need to obtain business agility and thrive against the competition while managing costs. 
(WHITE PAPER) READ ABSTRACT |

Transzap fuels a competitive edge with increased application uptime from IBM System z by IBM

December 2009 - (Free Research)
The System z solution from IBM has helped Transzap, a software-as-a-service firm establish a dynamic infrastructure that helps reduce costs and greatly improves the level of service Transzap is able to provide to its customers. Read this case study to learn about the features and business benefits of IBM's System z solution. 
(CASE STUDY) READ ABSTRACT |

Harnessing Oracle Governance, Risk, and Compliance Applications to Improve Your E-Business Suite 12.1 Upgrade by Oracle Corporation

July 2010 - (Free Research)
This video white paper explains how continued use of the Oracle GRC applications suite embeds deep-seated controls within EBS Release 12.1 so business processes are kept intact and optimized long after the upgrade project is complete.  
(WHITE PAPER) READ ABSTRACT |

The Ultimate Technology Business Management Guide by Apptio

September 2013 - (Free Research)
In this asset, read about Apptio, the leading provider of TBM solutions. Their suite of applications and SaaS delivery model provide IT organizations an efficient and cost effective approach to quickly adopt and realize the ongoing benefits of TBM. 
(WHITE PAPER) READ ABSTRACT |

Oracle + Sun Product Strategy Webcast Series - SPARC Enterprise Servers by Oracle Corporation

April 2011 - (Free Research)
Oracle invites you to view our Oracle + Sun Product Strategy Webcast series. You'll get the chance to learn more about the combination of Sun and Oracle—and what it means for you. This webcast will provide you with an overview of the Oracle SPARC Enterprise Server product line. 
(WEBCAST) READ ABSTRACT |

US Food Service - Streamline project includes Afaria by Sybase, an SAP company

May 2009 - (Free Research)
Watch this video to learn how US Food Service, the second largest food service provider, implemented Afaria from Sybase to streamline order entry and information management between their mobile sales force, distribution centers and the corporate office. 
(VIDEO) READ ABSTRACT |

451 Group Report on Federation Gateway Market & Cloud Access 360 by Intel

March 2011 - (Free Research)
In this Market Insight Report, 451 Group Steve Coplan provides a comprehensive independent review of the Intel Expressway Cloud Access 360 federation gateway. Steve covers how Intel’s acquisition of Nordic Edge plays into Intel’s latest moves in the security sector. 
(ANALYST REPORT) READ ABSTRACT |

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by Bit9, Inc.

June 2009 - (Free Research)
As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance... 
(WHITE PAPER) READ ABSTRACT |

Cost/Benefit Case for IBM PureData System for Analytics: Comparing Costs and Time to Value with Oracle Exadata Database Machine X3 by IBM

August 2013 - (Free Research)
In this white paper, see how expert solutions stack up and learn how to choose which hardware best suits your organization based on the nature of organizational informational architectures, trade-offs between compatibility with existing software and skills, the speed of new application deployment, and costs. 
(WHITE PAPER) READ ABSTRACT |

Unchain Your Network with Application Intelligence and Control by Dell Software

July 2012 - (Free Research)
Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Webcast: Application Architectures for Cloud Computing Environments by SearchDataCenter.com

October 2011 - (Free Research)
In this webcast, Bernard Golden, CEO of cloud consulting firm HyperStratus, describes the key principles of application architectures in a cloud computing environment. He also discusses the limitations of running applications in the cloud, including application integration issues, software licensing and security. 
(VIDEO) READ ABSTRACT |

Load Balance Simplification and the need for an ADC by Citrix

June 2013 - (Free Research)
This webcast reveals the changes affecting the modern data center network and details one of the fastest growing ADC solutions on the market that optimizes the delivery of apps and services with pay-as-you-grow elasticity. 
(WEBCAST) READ ABSTRACT |

Optimize your Network with ADC Clustering by Citrix

August 2013 - (Free Research)
Discover why active-active clusters of application delivery controllers (ADCs) are critical to not only improve app performance but also reduce waste, heighten potential ROI, simplify management, and improve reliability. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows mobile on any device by Citrix

June 2013 - (Free Research)
This exclusive white paper examines how you can virtualize Windows business applications and desktops in the data center and deliver high-performing, secure access to them from any type of mobile device, over any network connection. Read on to learn how you can take Windows mobile. 
(WHITE PAPER) READ ABSTRACT |

Five reasons why mobilizing Windows applications is simpler than you think by Citrix

March 2013 - (Free Research)
In this white paper, uncover five myths about Windows application development and learn how your company can go mobile with relative ease. 
(WHITE PAPER) READ ABSTRACT |

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by SearchSecurity.com

February 2013 - (Free Research)
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now. 
(EGUIDE) READ ABSTRACT |

Enterprise mobility management: Embracing BYOD through secure app and data delivery by Citrix

February 2013 - (Free Research)
Access this resource to learn more about enterprise mobility management (EMM), a mobile approach that allows IT to manage not only mobile devices themselves, but the applications and data present on them. Read on and learn about EMMs increasingly central role in the new era of IT. 
(WHITE PAPER) READ ABSTRACT |

How to Eat an Elephant: Strategies for Portfolio Modernization by Dell, Inc.

September 2012 - (Free Research)
In this white paper, discover a framework for modernizing these legacy applications. Learn what considerations you'll need to address along the path to achieving a truly agile applications portfolio that supports your organization's unique needs, and find best practices for putting your strategy into action. 
(WHITE PAPER) READ ABSTRACT |

Modernization & Enhancements: The Good, the Bad and the Ugly by Dell, Inc.

September 2012 - (Free Research)
Rationalizing your application portfolio doesn't have to be a daunting project; in fact, it can be accomplished in a simple, safe, cost-effective and efficient way. Read this white paper to discover a roadmap to help you streamline your IT operations. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts