Application Management

Application management and application performance management (APM) news, solutions, and analysis for IT professionals
  • Charities expose almost 500K Social Security numbers by filing their own taxes

    Posted April 9, 2012 - 3:44 pm

    Identity theft prevention vendor Identity Finder sifted through 3 million non-profit tax returns looking for accidental revelations of private data. They found almost half a million posted in public documents, 171,000 of which were unique.
  • White Paper

    Microsoft Technology Center Reduced SharePoint 2010 Migration by Two Months with DocAve

    Posted April 5, 2012 - 4:50 pm

    DocAve migrated 12,000 site collections and 200 custom lists from SharePoint 2007 to Microsoft Technology Center's hosted SharePoint 2010 environment. Find out how.
  • White Paper

    Office 365 SharePoint Online - Architectural considerations

    Posted April 5, 2012 - 4:50 pm

    The goal of this white paper is to clarify strategies for incorporating Microsoft Office 365 in your enterprise IT portfolio and address the technical considerations for activating SharePoint Online as part of your SharePoint strategy including migrating to Office 365.
  • White Paper

    Optimize SharePoint Storage with BLOB Externalization

    Posted April 5, 2012 - 4:50 pm

    This document is intended to provide a comprehensive and balanced examination of SharePoint storage concepts and issues, and to equip you to fully understand, communicate and make informed decisions about the role of BLOB externalization in your storage architecture.
  • White Paper

    Office 365 SharePoint Online - what does it mean to my organization as a CIO?

    Posted April 5, 2012 - 4:50 pm

    The goal of this white paper is to clarify the disjointed and sometimes inconsistent information about Microsoft Office 365-including its benefits, challenges, costs, and service level agreements (SLAs) - and address the business considerations for migrating to Office 365 SharePoint Online.
  • White Paper

    How to Implement an Effective SharePoint Governance Plan

    Posted April 5, 2012 - 4:50 pm

    Moving past the "what" and "why" of governance, an even harder question to answer is how to implement SharePoint governance. In this paper, we'll share a number of suggestions on how you can effectively implement a SharePoint governance plan.
  • New Microsoft tool maintains Windows user settings in virtual environments

    Posted April 4, 2012 - 9:25 pm

    Microsoft virtual Windows environments need not require a lot of manual configuration to customize applications and update operating system preferences each time users log in thanks to a product being added to the Microsoft toolbox.
  • Oracle frees Ops Center for existing customers

    Posted April 4, 2012 - 1:53 pm

    Organizations running a lot of Oracle gear and software could now get some management assistance from a software program that Oracle has made free for customers.
  • Webcast

    The Rise of the Mobile Workforce: Don't Lose Control of Managing End User Experience

    Posted April 3, 2012 - 5:00 pm

    Critical business apps are increasingly accessed by smartphones, tablets and other mobile devices. Due to the complexity of mobile apps, it is challenging to ensure optimal performance before they "go live". This 30-Minute Webinar will takes a look at the key challenges faced by IT and actionable steps you can take in order to provide 24/7 End User Experience (EUE) Management of applications accessed via mobile devices.
  • Pastebin tries to ditch hacked content; Anonymous is unlikely to leave

    Posted April 3, 2012 - 4:23 pm

    Anonymous text-posting site Pastebin has been the place hacktivists of all stripes have come to post their trophies. Files full of private data, source code from big vendors, threats to take down the Internet. If Pastebin goes straight, where will Anonymous' content go?
  • Android rootkit poisons apps that give users root control

    Posted April 3, 2012 - 3:43 pm

    A rootkit designed to install itself with pirated or root-access apps sneaks past users, gets them to give it root access, and keeps control by replacing critical Android system software with versions of its own. Does that mean users shouldn't root their phones to avoid infection?
  • Should you keep cell phones away from sensitive data?

    Posted April 3, 2012 - 1:49 pm

    The number, variety and abilities of smartphone exploits is growing exponentially, but few talk about the risk phones pose as entry points, not as a source of data leaks. Even if they're banned from sensitive areas, how can you keep them out without frisking everyone at the door?
  • Cruel April Fool prank plasters adorableness all over your AdBlock

    Posted April 2, 2012 - 4:21 pm

    An April Fool's prank backfired on the developer of AdBlock in a positive way. Replacing ads with cute-cat pics was so popular some people want to keep the prank version. So AdBlock gets a new product, CatBlock, which will cost you $10 a month and an anti-nausea prescription.
  • OpGlobalBlackout succeeded without happening

    Posted April 2, 2012 - 1:05 pm

    Operation Global Blackout, ostensibly a plan by hacktivist group Anonymous to take down the Internet March 31, didn't happen and was likely never real at all. It still satisfied someone's need to generate fear and chaos online, without having to do anything but make a video.
  • White Paper

    Building in Web Application Security from the Start

    Posted March 29, 2012 - 10:20 am

    This IDC white paper highlights the growing IT challenge of protecting web apps through software improvements and testing. It explains problems associated with web app insecurity, driving factors encouraging improved web app security, and the means to validate app security.
  • White Paper

    Web Application Security e-Kit

    Posted March 29, 2012 - 10:20 am

    IBM Rational® AppScan® can help you effectively design security into your products and services early in the lifecycle, in a way which is resilient to change. Download your complimentary e-Kit now.
  • Webcast

    The Critical Challenge of Application Security

    Posted March 29, 2012 - 9:10 am

    In this podcast you will hear how the IBM Rational AppScan software suite with a focus on AppScan Enterprise is used across an organization's software development lifecycle to increase visibility and control - helping address the critical challenge of application security.
  • Khelihos P2P botnet rises from dead a third time

    Posted March 28, 2012 - 1:42 pm

    An alliance of security companies took down the 110,000-member Khelihos botnet this week by cracking its encryption, ending Khelihos II, The Sequel. The virus has already revived and begun to spread, as it did after Microsoft shut the original down last September,
  • White Paper

    Cloud, Appliance or Software - Pros and Cons

    Posted March 27, 2012 - 12:41 pm

    Powerful backup and flexible deployment options, including enhanced software, backup appliances, and backup solutions in the cloud, offer flexibility and choice in how you manage backup, allowing you to deploy a modern infrastructure that best suits your IT requirements, business needs, and environment. But how do you know which backup strategy is right for your business?
  • Time to quit Facebook; it doesn't Like you any more

    Posted March 23, 2012 - 5:26 pm

    Facebook updated the document defining the rights users can expect online, though given the result it's a surprise the document isn't blank. Not only is there no 'privacy' in its 'privacy policy,' what few rights are left belong to apps that get your data without ever having to ask.
  • Online buyers value privacy, but not much

    Posted March 23, 2012 - 3:29 pm

    Despite surveys showing consumers put a high value on privacy, when push comes to shove, less than a third are willing to pay even 66 cents more to disclose less personal data.
  • Forget hackers, Indian call center workers may be stealing your financial data

    Posted March 23, 2012 - 11:37 am

    A pair of British reporters posing as identity thieves report there is a burgeoning market data stolen from Indian call centers, which is not only fresh, it's far more complete than fragments and aging records stolen in most data breaches.
  • Review

    New Dell PowerEdge: More power, deeper management

    Posted March 23, 2012 - 7:15 am

    First look: 12-gen, 2U Dell PowerEdge R720xd pairs hardware heft with first-rate remote management tools
  • White Paper

    Akamai's Application Acceleration Services: Transform the Internet into a Business-ready Application Delivery Platform

    Posted March 22, 2012 - 6:10 pm

    Learn how the Internet can impact the performance of web-enabled application response times to end users and how Akamai's Internet overlay network can address the quality uncertainties of the Internet.
  • White Paper

    2011 Application & Service Delivery Handbook

    Posted March 22, 2012 - 6:10 pm

    Are you an IT organization that needs to ensure acceptable application delivery? Download the Application and Service Delivery Handbook to explore the methodology, techniques, and tools for addressing the complexities presented by cloud computing models, whether public, private or hybrid environments.
Join us:






Join today!

See more content
Ask a Question