Systems ApplicationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Systems Applications returned the following results.
RSS What is RSS?
Related Categories

 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Application Management and Maintenance
 •   Disk-based Backup & Storage/ RAID
 •   Application Integration
 •   Availability, Performance and Problem Management
 •   Storage Management
 •   Backup Systems and Services
 •   Operating Systems and Subsystems

Related Searches
 •   Accessing Systems Applications
 •   Change Systems Applications
 •   Desktops Systems Applications
 •   Measure Systems Applications
 •   Sales Systems
 •   Softwares Systems Applications
 •   Spreadsheets Systems
 •   Standard Systems
 •   Systems Applications Based
 •   Systems Applications Communication
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Lumension Vulnerability Scanner Offer by Lumension

March 11, 2009 - (Free Research)
This network-based scanning utility provides comprehensive visibility into the IT environment through in-depth scans and the automated discovery of all assets, both managed and unmanaged. Scan up to 25 nodes. 
(ASSESSMENT TOOL) READ ABSTRACT |

Neusoft Telecom BSS Virtualized Application Performance on the Intel® Xeon® Processor 7500 Series using VMware vSphere 4 by Intel

May 05, 2010 - (Free Research)
This paper discusses how Intel and Neusoft took advantage of the performance and scalability of Intel® Xeon® processor 7500 series-based servers to address some of the critical challenges in the telecom industry. 
(DATA SHEET)

Information Security Magazine – April 2014 by SearchSecurity.com

April 01, 2014 - (Free Research)
In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks. 
(EZINE) READ ABSTRACT |

Solving SAP® Application Access and Security Challenges with an Identity-Infused Enterprise by Novell, Inc.

May 23, 2011 - (Free Research)
In this white paper, discover how Systems, Applications and Products (SAP) can help organizations add secure access by infusing identity throughout their environments, without adding any workload. 
(WHITE PAPER) READ ABSTRACT |

Best practices for solutions architecture by IBM

November 13, 2013 - (Free Research)
Solutions architecture has gained a reputation for being difficult in comparison to its counterparts, enterprise and software architecture. In this expert e-guide, you'll hear from Mike Rosen, chief scientist at architectural consulting firm Wilton Consulting Group, as he details these essential best practices for solutions architecture. 
(EGUIDE) READ ABSTRACT |

Improve the Efficiency and Productivity of Healthcare Workers--with NetMotion Wireless' Award-winning Mobile VPN Software, Mobility XE by NetMotion Wireless

June 2008 - (Free Research)
Mobility XE has proved to be a vital component acting as the fulcrum in maintaining the wireless connection, and giving clinicians access to their applications. 
(WHITE PAPER) READ ABSTRACT |

Gaining the Performance Edge Using a Column-Oriented Database Management System by Sybase, an SAP company

July 2009 - (Free Research)
This paper explores the data explosion phenomenon and why column-oriented database systems are able to provide the boost that is needed to gain the performance edge. The paper contrasts row-oriented systems with column-oriented systems, and then elaborates on the benefits of the columnar approach. 
(WHITE PAPER) READ ABSTRACT |

Assessing the Financial Impact of Downtime by Vision Solutions

August 2010 - (Free Research)
This white paper will address the assessment of threats to your IT operations, inclusive of systems, applications, and data, and will guide you through the process of developing solid numbers around the potential costs they represent. 
(WHITE PAPER) READ ABSTRACT |

Leveraging the Cloud for Data Protection and Disaster recovery by CA Technologies.

March 2012 - (Free Research)
This informative white paper provides insight into how to approach cloud resources for system, application and data protection. 
(WHITE PAPER) READ ABSTRACT |

The Consumerization of IT: Security Challenges of the New World Order by CA Technologies.

May 2012 - (Free Research)
Discover the ins and outs of consumerization: Why it is occurring and the major impact it will have on your business. Uncover the trend's inherent security implications and the methods you can use to keep your critical systems, applications, and information safe, regardless of what device is being used to access them. 
(WHITE PAPER) READ ABSTRACT |

How can I Overcome the Security Challenges of Today’s Virtualized Infrastructures? by CA Technologies.

September 2010 - (Free Research)
Read this solution brief to learn how to improve control over systems, applications and information to reduce risk in both physical and virtual server environments. 
(WHITE PAPER) READ ABSTRACT |

SMB Guide to Continuous Operations by CA Technologies.

November 2010 - (Free Research)
SMBs can’t afford not to have a plan for continuous operations, especially when it comes to the computer systems, applications and data the business depends on to keep going — and growing. This paper highlights some of the issues around implementing SMB business continuity practices and provides guidance on developing an effective BC strategy. 
(WHITE PAPER) READ ABSTRACT |

CA ARCserve Family of Products: Success Stories by CA ARCserve

August 2010 - (Free Research)
The CA ARCserve Family of Products is a complete portfolio that gives you more control over your changing business by delivering total protection, recovery and availability for systems, applications and data. Read these customer success stories to learn more. 
(CASE STUDY) READ ABSTRACT |

Windows Server and Storage eBook, Ch 3 - Assess Your Data Center Storage Needs by Dell, Inc. and Intel®

August 2009 - (Free Research)
Servers play a crucial role in daily enterprise operations. But even the most powerful and resilient servers are useless without adequate storage. Storage solutions contain the operating systems, applications and virtual images needed to operate every server. This eBook chapter will help you better understand your data center storage challenges. 
(EBOOK)

Defender 5: The Right Way to Prove, Identify and Establish Trust by Dell Software

February 2011 - (Free Research)
The Quest Software technical brief -- “The Right Way to Prove Identity and Establish Trust” -- explains how to verify an employee’s identity at log in. You'll also learn how Quest Defender gives your organization more control than ever over who has access to systems, applications and data - going well beyond a simple log-in name and password. 
(WHITE PAPER) READ ABSTRACT |

Managing the Information that Drives the Enterprise Storage: Focus on Virtual Desktops and Storage by Dell, Inc.

April 2011 - (Free Research)
Planning and managing storage capacity in a VDI poses unique challenges. Check out this e-book to learn VDI best practices and hear VDI success stories before getting started on your project. 
(EBOOK) READ ABSTRACT |

Deep Security as a Service: Cloud Security for Amazon Web Services (AWS) by Trend Micro

December 2013 - (Free Research)
Access this white paper to unveil a deep security as a service option that offers scalable protection for the cloud's elastic environment. Click now to see how to get maximum value out of your cloud investment. 
(WHITE PAPER) READ ABSTRACT |

Security Virtualization: Re-architecting the Appliance Mentality by Crossbeam Systems

November 2008 - (Free Research)
In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today. 
(WHITE PAPER) READ ABSTRACT |

Remote/Branch Office Data Protection and System Availability by CA ARCserve

August 2010 - (Free Research)
There are many approaches to remote office data protection and system availability. This paper describes best practices in using available technologies for protection, recovery and availability of remote or branch office systems, applications and data. 
(WHITE PAPER) READ ABSTRACT |

Cloud Security Designed for Amazon Web Services (AWS) by Trend Micro

May 2014 - (Free Research)
This white paper offers a brief overview of an Amazon Web Services security solution that relies on security pros to customize its offered features to efficiently and effectively defend your assets in the cloud. 
(WHITE PAPER) READ ABSTRACT |

The Role of Security Management in Achieving "Continuous Compliance" by CA Technologies.

December 2007 - (Free Research)
There's a focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. This paper details the benefits of continuous compliance, which include reduction of risk and cost. 
(WHITE PAPER) READ ABSTRACT |

CA ARCserve Replication r15 and CA ARCserve High Availability r15 Evaluation Software by CA ARCserve

June 2010 - (Free Research)
CA ARCserve® Replication offers continuous data protection to complement any backup solution. This software trial includes all Replication and High Availability features for your convenience and testing. Download now. 
(DOWNLOAD) READ ABSTRACT |

The State of System i Security 2007 by PowerTech

April 2007 - (Free Research)
This study highlights a number of very common security exposures and configuration management practices that must be mitigated in order to protect the data that resides on the AS/400. 
(WHITE PAPER) READ ABSTRACT |

Meeting Tomorrow's Internet Performance Requirements by Keynote Systems

March 2007 - (Free Research)
Few businesses can operate effectively today without an online presence. Web-based applications provide essential links with customers, partners, and employees. Service Level Management (SLM) is one way of managing the customer experience ... 
(WHITE PAPER)

IBM Solutions for Predictive Maintenance by IBM

February 2014 - (Free Research)
View the following webcast to get a firsthand look at predictive maintenance and how it can detect problems and areas of attention way before it causes your business severe downtime and slowed productive processes. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts