RSS feed Get our RSS feed

News by Topic

application monitoring

Results 126 - 150 of 215Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Jun 05, 2013
Whether you want to map directions, find a restaurant, look up your flight details, see where your next meeting is, or just check your email, chances are you do it on your smartphone. Just about everything is going mobile. Industries such as retail and financial services are going mobile to increase efficiency and generate more revenue. Mobile business apps and mobile enterprise apps have the potential to transform organizations. This white paper discusses key mobile trends and analyzes how financial services organizations must change their IT application development, testing, monitoring, and management methodologies while extending their services to multi-client mobile environments, leveraging both Native and Mobile-oriented Web apps.
Tags : mobility, financial services, revenue stream, application development
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP SAS     Published Date: Oct 15, 2008
SAS Grid Computing delivers enterprise-class capabilities that enable SAS applications to automatically leverage grid computing, run faster and takes optimal advantage of computing resources. With grid computing as an automatic capability, it is easier and more cost-effective to allocate compute-intensive applications appropriately across computing systems. SAS Grid Manager helps automate the management of SAS Computing Grids with dynamic load balancing, resource assignment and monitoring, and job priority and termination management.
Tags : grid computing, sas grid computing, increase compute hardware, it infrastructure, enterprise computing infrastructure, data integration, grid monitoring, grid management
     HP SAS
By: IBM     Published Date: Feb 18, 2009
Let’s face it, DBAs have a tough job.  DBAs must manage a complex set of tasks including ensuring high performance and availability, maintaining business critical production applications and managing changes. 
Tags : : ibm integrated data management, dbas, performance monitoring, data management tools, data retention, data growth
     IBM
By: IBM     Published Date: Aug 25, 2009
Reduce the long, after hours finger pointing through proactive performance monitoring all while facilitating collaboration and driving organizational efficiencies.
Tags : data management tools, ibm, dba, manage database, application changes, proactive performance monitoring, after hours finger pointing, organizational efficiencies
     IBM
By: IBM     Published Date: Apr 26, 2013
This Magic Quadrant assesses the APM market. First, we will define the market and explain why it's important to treat the five functional dimensions that together constitute its technology foundation in an integrated manner and to distinguish the APM market from others that are closely related to it. Next, we will set out the qualifying criteria for inclusion in this research and then survey some general characteristics of each of the resulting quadrants. This research will then conclude with a brief study of each participating vendor's APM strengths and weaknesses.
Tags : gartner, magic, quadrant, application, performance, monitoring, apm, market
     IBM
By: IBM     Published Date: Jul 11, 2012
This paper discusses the challenges of managing applications in highly dynamic IT environments such as public and private Clouds. Modern enterprise applications are engineered for agility and are frequently deployed over flexible IT infrastructures.
Tags : modern applications, architectures, infrastructure, cloud, dynamic it, web traffic, scalability, reliability
     IBM
By: IBM     Published Date: Apr 15, 2015
Still wondering what all the application monitoring hype is about? Read more to find out all the reasons why you still don't need to monitor your apps, no matter what everyone else says!
Tags : applications, monitoring, ibm, analytics, business intelligence
     IBM
By: IBM Corporation     Published Date: Jun 28, 2011
Managing a mixed platform and vendor IT environment presents many challenges. The problems escalate with the number of different tools used to manage the infrastructure. Customers are looking to reduce the number and variety of management tools they must use. One early adopter of IBM's ITCAM for Microsoft Applications shares the lessons learned from that experience and comments on the benefits of the latest version.
Tags : enterprise monitoring, service management, tivoli, itcam, netcool, business service, composite application, soa governance
     IBM Corporation
By: Indicative Software     Published Date: Aug 24, 2007
Learn about agent-based versus agentless monitoring approaches to enterprise management, and how a combination of data collection technologies can realize the benefits of both.
Tags : enterprise management, enterprise monitoring, data collection, data collection engines, agent-based monitoring, agentless monitoring, performance monitoring, application performance
     Indicative Software
By: Intel Security     Published Date: Oct 20, 2015
Explore and Understand the Seven Common Misconceptions Regarding Advanced Malware
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     Intel Security
By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : monitoring, software as a service, saas, high availability, network management, jumpnode
     Jumpnode Systems
By: Keynote     Published Date: Apr 23, 2014
In the world of digital interactions, the margin between success and disengagement or abandonment is measured in milliseconds. With the exploding adoption of advanced smartphones and tablets, you need a mobile-first approach to engaging with customers and employees. And as your mobile initiatives are delivered at increasingly rapid rates, the quality and reliability of the mobile apps, mobile web and connected services that support them has become critically important. For the technology teams delivering customer and employee services in the mobile channel, it is important to understand that performance monitoring solutions which work for the desktop cannot be simply applied to mobile. Managing the mobile end user experience requires an understanding of the challenges posed by the complexities of the mobile environment. This paper will reveal the 4 pillars of mobile performance, plus offer strategies for accurately monitoring mobile end user experience so you can continuously improve.
Tags : mobile application monitoring, mobile application monitoring system, mobile app performance, mobile application performance, app monitoring, monitor mobile applications, web performance monitoring tools, performance monitoring
     Keynote
By: Knoa     Published Date: Jul 17, 2007
What is often overlooked is that application performance is just one of three key drivers of return on investment (ROI) from your Siebel application. An efficient infrastructure is critical. It's important to optimize the Siebel application for your own unique business environment, user needs and usage patterns. But, it's all for naught if you do not build and sustain adoption and efficient and effective use of the Siebel application by your end users.
Tags : epm, performance management, experience management, knoa, siebel, crm, customer relationship, end user
     Knoa
By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : "advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
     McAfee
By: McAfee     Published Date: Oct 28, 2014
Broad adoption of SIEM technology is being driven by the need to detect threats and breaches, as well as by compliance needs. Early breach discovery requires effective user activity, data access and application activity monitoring. Vendors are improving threat intelligence and security analytics. Read this report from leading analyst firm Gartner, to learn why they have placed McAfee as a Leader in the Magic Quadrant for Security Information and Event Management.
Tags : siem, mcafee enterprise security manager, gartner, magic quadrant, threat management, collect, store, forensics and regulatory compliance
     McAfee
By: Metalogix     Published Date: Jan 10, 2014
Microsoft SharePoint is the fastest growing product in Microsoft history. Its adoption rate has been exponential with millions of documents being stored daily. With its growth, critical documents and procedures are now being stored in SharePoint. It is fundamental that SharePoint maintains its healthy status, and application performance is a key component for a successful deployment, adoption and monitoring of SharePoint.
Tags : sharepoint, sharepoint performance, sharepoint adoption, optimize sharepoint, sharepoint diagnostics, sharepoint tuning, sharepoint performancetuning, sharepoint performance monitoring
     Metalogix
By: Microsoft Carat APAC     Published Date: Dec 12, 2017
Web apps once thought impossible due to scale, complexity, or because they simply couldn’t be imagined, are now a reality with the cloud. In this guide, we’ve explored the Azure App Service and highlighted Azure’s support for platform as a service (PaaS). We’ve shown you how you can take an existing website backed by a SQL Server database and move it to the cloud. You’ve seen how you can easily add features such as identity management and caching to your web app. You’ve also learned that you can enable rich application monitoring with a few clicks.
Tags : code, business, optimization, scale, support, cloud, paas
     Microsoft Carat APAC
By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : financial services paas, private clouds, disparate environments, memory utilization, it manageability
     MuleSoft
By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load
     NeoSpire Managed Hosting
By: New Relic     Published Date: Jun 05, 2014
This eBook examines the current state of mobile application performance monitoring; the challenges this is creating for mobile app development; and how the new forms of mobile APM are helping developers create better user experiences for customers and grow their businesses.
Tags : new relic, mobile, mobile apps, mobile app performance, apm, developers, user experiences
     New Relic
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics