IT Management  >   Systems Operations  >   Configuration Management  >  

Application Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
Application Configuration ManagementWhite Papers (View All Report Types)
 
Offshore Software Test Automation: A Strategic Approach to Cost and Speed Effectiveness
sponsored by LogiGear Corporation
WHITE PAPER: This white paper presents an overview of an innovative approach to integrating global resourcing and the latest test automation tools. It also explores the software development and testing process, global resourcing and the automation of software testing.
Posted: 04 Aug 2008 | Published: 01 Jan 2006

LogiGear Corporation

Virtualization Performance Study
sponsored by ClearCube Technology
WHITE PAPER: Managing desktop virtualization environments has been extremely challenging as the industry lacks a standard method of measuring performance. Read this white paper to read the results of a recent study that attempts to evaluate virtualization performance.
Posted: 08 May 2007 | Published: 01 May 2007

ClearCube Technology

Document Management with Office SharePoint Server 2007
sponsored by Microsoft
WHITE PAPER: The Office SharePoint Server 2007 document management solution is uniquely positioned to help your organization succeed with its document management goals. With Sharepoint you can extend document management capabilities to all employees, improving compliance with enterprise standards and delivering value to the business.
Posted: 17 Apr 2009 | Published: 01 Aug 2007

Microsoft

5 things your Development Teams should be doing now
sponsored by CollabNet
WHITE PAPER: In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. In this paper, find five tested and proven software development practices your team should be utilizing to accelerate software delivery.
Posted: 11 Nov 2011 | Published: 08 Nov 2011

CollabNet

Optimizing ITIL Best Practices with Mercury BTO
sponsored by Mercury
WHITE PAPER: Learn how to optimize Information Technology Infrastructure Library using best practices which will enable users to tailor ITIL processes to meet business requirements.
Posted: 20 Dec 2005 | Published: 01 Dec 2005

Mercury

Deploying DB2 database on the Sun Storage 7000 Unified Storage System
sponsored by Sun Microsystems, Inc.
WHITE PAPER: Recognizing the need for easy-to-manage, eco-friendly, and scalable storage solutions that deliver exceptional business value, Sun created the Sun™ Storage 7000 Unified Storage Systems. These systems incorporate an open-systems approach that selects superior general-purpose servers and storage components.
Posted: 16 Apr 2009 | Published: 16 Apr 2009

Sun Microsystems, Inc.

Load Testing: Mitigating Risk before Go-live
sponsored by Mercury
WHITE PAPER: The role of enterprise software is to facilitate and optimize business processes. Testing of new, upgraded, and newly integrated software applications, before they go live, is one proven way to mitigate the risk.
Posted: 16 Nov 2006 | Published: 01 Nov 2006

Mercury

Choose an ALM solution that meets your strategic requirements
sponsored by IBM
WHITE PAPER: This buyer's guide describes the key criteria for application lifecycle management (ALM) solutions for today's high-performance teams. It includes key considerations for enhancing your single- or multi-vendor ALM environment.
Posted: 09 Mar 2012 | Published: 31 Dec 2011

IBM

Mercury Customer Perspective: Using Mercury TestDirector to Develop a Software Defect Reporting and Resolution Process
sponsored by Mercury
WHITE PAPER: In this whitepaper a Mercury user shares her unique viewpoint and wealth of experience gained from using Mercury TestDirector to support a variety of large-scale projects, the setup and management of the processes, and how easy the processe...
Posted: 20 Nov 2006 | Published: 01 Jan 2005

Mercury

Using Cyclomatic Path Analysis to Detect Security Vulnerabilities
sponsored by McCabe Software, Inc.
WHITE PAPER: The paper discusses how path coverage is better than branch or statement coverage in testing to uncover security vulnerabilities, including showing how several CWE vulnerabilities could be undetected by branch coverage but detected by path coverage. Download this paper and find out how Cyclomatic Path Analysis can uncover these vulnerabilities.
Posted: 10 Nov 2010 | Published: 10 Nov 2010

McCabe Software, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement