Using Approach To ApplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Using Approach To Application returned the following results.
RSS What is RSS?
Related Categories

 •   Disk-based Backup & Storage/ RAID
 •   Application Management and Maintenance
 •   Data and Application Distribution
 •   Availability, Performance and Problem Management
 •   Storage Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)

Related Searches
 •   Batch Using
 •   Codes Using
 •   Contact Using Approach
 •   Firm Using
 •   Industry Using
 •   Using Approach Size
 •   Using Approach To Measured
 •   Using Creation
 •   Using Portals
 •   Using Tutorials
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Revolutionizing Application Performance Through Optimized Disk I/O by Kaminario

August 10, 2010 - (Free Research)
This paper examines a new approach to improving application performance, which is capable of delivering millions of IOPS and tens of GB/s throughput and allows capacity and performance to scale independently. Read on to learn about this cost effective, easy to use approach to dramatically improving application performance. 
(WHITE PAPER) READ ABSTRACT |

Application Security Advice: Stop Threats before They Start by SearchSoftwareQuality.com

May 20, 2014 - (Free Research)
Too often, application developers treat security as an afterthought, and they believe last-minute security testing will be enough to safeguard their applications from threats. Consult this expert handbook to learn how to build in security at every stage of the application lifecycle. 
(EBOOK) READ ABSTRACT |

An Objective Approach to Security by Bytware, Inc.

May 01, 2007 - (Free Research)
i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this... 
(WHITE PAPER) READ ABSTRACT |

EMC's Comprehensive Approach for Building Proven Information Infrastructure Solutions by Wipro Technologies

October 30, 2008 - (Free Research)
In this paper, Wipro Technologies focuses on the methodology EMC follows for building its Proven Solutions for organizations of all sizes and domains. This paper also demonstrates the methodology using an example of the solution development process for Microsoft Exchange in physical and VMware environments. 
(WHITE PAPER) READ ABSTRACT |

Using Code Quality Metrics in Management of Outsourced Development and Maintenance by McCabe Software, Inc.

March 13, 2009 - (Free Research)
This paper provides answers to basic questions relating to the management of outsourced development and maintenance. What is the metrics approach to managing sub-contractors? What is the quality of the code expected to be that has been developed by the sub-contractor? Read on for the answers to these and other important considerations. 
(WHITE PAPER) READ ABSTRACT |

Integrating Use Cases, Storyboarding and Prototyping by Ivar Jacobson Consulting

June 2008 - (Free Research)
This white paper discusses how to optimize requirements gathering and documentation through the integration of use case, storyboarding and prototyping. 
(WHITE PAPER) READ ABSTRACT |

Consolidating Applications with Oracle Solaris Containers by Oracle Corporation UK Ltd

May 2010 - (Free Research)
The goal of this white paper is to provide information about consolidating applications onto a single server using Oracle Solaris Containers to isolate applications and efficiently manage system resources between them. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

Predictive Insights: Denial of Service Use Case by IBM

November 2013 - (Free Research)
Modern enterprises can't afford application downtime, so taking a reactive approach to performance issues isn't effective. You need a proactive approach to problem management -- and with the right tools, that's possible. 
(VIDEO) READ ABSTRACT |

Computer Weekly – 12 February 2013: Can BlackBerry 10 bridge the business-consumer smartphone divide? by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new smartphone from BlackBerry – it's designed to please both business and consumer users, but is it enough to save the company? We examine the options for using cloud services for disaster recovery. And IT leaders tell us what they think about the future of the data centre. Read the issue now. 
(EZINE) READ ABSTRACT |

Sunny Days with Cloud Computing by Stoneware, Inc.

July 2008 - (Free Research)
This whitepaper discusses "Cloud Computing" which is a new catch phrase or buzzword for an approach to simplifying an organization's IT environment through the use of virtualization and web technologies. 
(WHITE PAPER) READ ABSTRACT |

Red Hat PaaS: Bringing Open Choice & Application Portability to the Cloud by Red Hat and JBoss

February 2011 - (Free Research)
This paper describes the capabilities, direction, and underlying principles of Red Hat’s PaaS strategy and is intended to help enterprise IT organizations, ISVs, and anyone planning a cloud deployment. Red Hat PaaS components will be delivered in phases so that our customers can take advantage of features and functionality as soon as possible. 
(WHITE PAPER) READ ABSTRACT |

Improving Application Availability with a Comprehensive Approach to WAN Optimization by BlueCoat

September 2009 - (Free Research)
Satisfying a WAN's need for speed may not be the best and most cost-effective way to improve applications performance and access across a network. Read about a more constructive approach in this eGuide. 
(EGUIDE) READ ABSTRACT |

Data Deduplication Approaches: Solving Today's Most Common Backup Problems by Quantum Corporation

December 2008 - (Free Research)
This Technology Brief discusses different approaches to data deduplication in the market today along with the pros and cons of each, and then matches some of the most common backup problems to a recommended deduplication approach. The brief close with a spotlight on Quantum's DXi7500 enterprise disk backup and replication system 
(ANALYST REPORT) READ ABSTRACT |

Using DevOps Approaches for Pre-release and Production Software Quality by IBM

October 2013 - (Free Research)
This essential E-Guide highlights the benefits of a DevOps approach and explores how businesses can successfully integrate their teams to increase collaboration, streamline testing processes and reduce risks. 
(EGUIDE) READ ABSTRACT |

Mule Studio DataMapper: Graphical Data Mapping for Application Integration by MuleSoft

December 2013 - (Free Research)
Access the following white paper to uncover several various approaches to successful data mapping. Discover the benefits and drawbacks of each and ultimately, how to decide which approach is right for you and your organization. 
(WHITE PAPER) READ ABSTRACT |

Lab Test: AppZero Turbo-Charges Server Consolidation by AppZero

March 2009 - (Free Research)
This paper examines the impact of application virtualization technology on overall system performance. It documents a simple performance evaluation of application virtualization using AppZero virtual application appliance (VAA) compared to a VMware ESXbased system using virtual machines (VM). 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Managing Software Intellectual Property by Black Duck Software

July 2008 - (Free Research)
This paper describes the approaches for managing intellectual property during component-based software development, detailing the seven best practices an organization should adhere by to facilitate the successful management of software IP. 
(WHITE PAPER) READ ABSTRACT |

Using the F5 Acopia ARX for Automated Storage Tiering by F5 Networks

September 2008 - (Free Research)
IT organizations have the challenging task of managing an ever increasing amount of file data. The F5 Acopia intelligent file virtualization solution provides an automated tiering approach, without the drawbacks associated with other solutions. 
(WHITE PAPER) READ ABSTRACT |

Whose Fault is it Anyway? Using Compuware Abend-AID to Diagnose DB2 and WebSphere MQ Problems by Compuware Corporation

September 2009 - (Free Research)
This paper discusses how you can leverage existing Abend-AID capabilities to simplify problem resolution even in these increasingly complex systems. Read this paper to learn more about diagnosing DB2 and WebSphere MQ problems with Compuware Abend-AID. 
(WHITE PAPER) READ ABSTRACT |

Object Storage: A Fresh Approach to Long-Term File Storage by Dell, Inc.

April 2011 - (Free Research)
In this white paper we explore Object Storage, compare it to traditional NAS, and demonstrate that an intelligent, policy based data management strategy is the best approach to determining when it is beneficial for organizations to use Object Storage, or continue to use NAS. 
(WHITE PAPER) READ ABSTRACT |

Network Security 2.0: A Systems Approach to Threat Mitigation Augments Defense in Depth by Cisco Systems, Inc.

May 2008 - (Free Research)
In the first edition of a six part series on Network Security sponsored by Cisco Systems, security architecture is the focus. Specifically covered is a systems approach that builds on IT security investment using System Management for policy, reputation and identity. 
(WHITE PAPER) READ ABSTRACT |

Agile for Dummies eBook by IBM

August 2012 - (Free Research)
If you're looking to start a development project using agile, explore this resource to learn how to approach the process in a way that will ensure success. 
(EBOOK) READ ABSTRACT |

SysML-Based Systems Engineering Using a Model-Driven Development Approach by IBM

October 2008 - (Free Research)
This paper describes a SysML-based (Systems Modeling Language) process that systems engineers can use to capture requirements and specify architecture. The approach uses model execution as a means for requirements verification and validation. 
(WHITE PAPER) READ ABSTRACT |

Real-Time Data Integration for Data Warehousing and Operational Business Intelligence by Oracle Corporation

August 2010 - (Free Research)
This white paper addresses the business reasons to move to real-time data warehousing and describes the common data integration approaches, with an emphasis on using real-time CDC capabilities and Oracle’s data integration offerings in that area -- including Oracle GoldenGate 11g and Oracle Data Integrator Enterprise Edition 11g. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts