Applications Monitoring White Papers

(View All Report Types)
Versatile Approach for Optimizing Business Service & Application Performance in a World of Accelerating Change
sponsored by IBM
WHITE PAPER: To optimize business services and application performance, IT organizations need a complete picture of all IT assets and services that contribute to customer and user experience.
Posted: 07 Oct 2011 | Published: 30 Jun 2011

IBM

The Application Usage and Risk Report
sponsored by Palo Alto Networks
WHITE PAPER: This Application Usage and Risk Report from Palo Alto Networks provides a global review of enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide. View now to uncover key findings so that you can build effective strategies to mitigate the risks inherent in certain application.
Posted: 16 Apr 2012 | Published: 01 Dec 2011

Palo Alto Networks

Online Retail Banking Success Hinges on Positive User Experiences: How APM Makes the Difference
sponsored by Compuware
WHITE PAPER: Access this detailed case study that highlights how an online retail banking service implemented an application performance management (APM) solution that offers rapid issue detection and identification for efficient troubleshooting to reduce any downtime, and keeps customers satisfied.
Posted: 24 Oct 2013 | Published: 30 Jun 2011

Compuware

How Dell IT Implements Microsoft SQL Server 2005 with Database Mirroring
sponsored by DellEMC and Intel®
WHITE PAPER: Upgrading from SQL Server 2000 to 2005 may seem like a daunting task, but the benefits are plentiful. Get a comparison of features between the two versions, learn about simplified management with MOM management packs and improved database mirroring.
Posted: 18 Sep 2006 | Published: 15 Sep 2006

DellEMC and Intel®

Transaction Tracing through Complex Web Applications
sponsored by Dell Software
WHITE PAPER: To ensure that application slowdowns and other revenue-impeding application issues are isolated, diagnosed and fixed quickly, sometimes it’s necessary to trace transactions from their source across all of the technology domains that contribute to transaction response time. Read this paper now to learn more.
Posted: 27 Dec 2010 | Published: 27 Dec 2010

Dell Software

Managing Applications with Oracle Enterprise Manager 10g
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses how to address the challenges of managing mission-critical applications. Read this white paper to learn about benefits of adopting an application management solution like Oracle Enterprise Manager.
Posted: 07 Mar 2007 | Published: 01 Oct 2006

Oracle Corporation

Enabling Ubiquitous Visibility in Virtualized Enterprises
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance and introduces one company's network performance management solution.
Posted: 04 Aug 2014 | Published: 31 Dec 2012

Riverbed Technology, Inc.

10 Steps to Application and Network Performance Nirvana
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This resource details a 10-step process to help organizations improve application and network performance management so that no issue is overlooked and business downtime can be prevented.
Posted: 21 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Myth Busted: Affordable, Easy to Manage Virtualization with High-Availability is a Reality
sponsored by Stratus Technologies
WHITE PAPER: SMBs want to take advantage of the benefits of virtualization but it can be costly to manage if they do not have the required skills in-house. Dan Kusnetzky takes a deep look at all of the benefits as well as the issues these businesses are facing, including the requirement to use automated systems, reducing complexity and maintaining availability.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

Ensuring Application Security in Mobile Device Environments
sponsored by IBM
WHITE PAPER: This crucial paper examines mobile application security in the age of BYOD, discussing common threats and what your organization can do to seal up vulnerabilities.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

IBM