IT Management  >   Systems Operations  >  

Change and Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
Change and Configuration ManagementWhite Papers (View All Report Types)
 
Configure or Customize?
sponsored by Workday
WHITE PAPER: In this paper, we examine the high cost of making and supporting customizations to client/server-based applications as well as the differences between configuration and customization.
Posted: 19 Mar 2014 | Published: 31 Dec 2012

Workday

Write Java code 17% faster by eliminating app server restarts
sponsored by ZeroTurnaround
WHITE PAPER: Software development is an iterative process, meaning that developing a single component can result in cycles of code change, deploy, and test. However, multiple deployments and restarts to different application servers can be time-consuming. Fortunately, this white paper introduces a way for developers to instantly see the results of code changes.
Posted: 31 Mar 2014 | Published: 31 Mar 2014

ZeroTurnaround

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Audits, Compliance and Security: IT Pros share their experience
sponsored by Dell, Inc.
WHITE PAPER: Changes to your Windows environment can be dangerous to your network and applications, but event logging and change reporting can be time-consuming and ineffective. Fortunately, this helpful white paper introduces a way to audit changes from a central web-based console, saving time, reducing risk, and quickly identifying security violations.
Posted: 16 May 2014 | Published: 16 May 2014

Dell, Inc.

BI for the People – and the 10 Pitfalls to Avoid in the New Decade
sponsored by QlikTech, Inc.
WHITE PAPER: This paper outlines the 10 common pitfalls associated with traditional BI approaches that prevent organizations from getting full value from their BI investments. Continue reading to learn more about these 10 pitfalls and how to avoid them in the new decade.
Posted: 29 Sep 2010 | Published: 29 Sep 2010

QlikTech, Inc.

Practical Steps to Achieve and Maintain NERC Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.
Posted: 31 Jul 2009 | Published: 08 Dec 2008

Tripwire, Inc.

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

Crossing the DevOps chasm
sponsored by CA Technologies
WHITE PAPER: Every company wants to deliver apps faster and more cost efficiently, but development and operations remain separated by the challenging release step. Check out this white paper to learn how you can bridge the gaps in your delivery lifecycle in order to speed deployment times by adopting service virtualization, release automation, and more.
Posted: 17 May 2013 | Published: 17 May 2013

CA Technologies

Seven Practical Steps for Federal Cyber Security and FISMA Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy.
Posted: 05 Oct 2009 | Published: 27 Apr 2009

Tripwire, Inc.

Why Business Rules?: A Case for Business Users of Information Technology
sponsored by IBM
WHITE PAPER: This whitepaper explains how business people are allowed to directly define how their business rules are being executed with a BRMS; and, perhaps more important, how it facilitates change in an easy, safe and reliable manner.
Posted: 07 Jul 2011 | Published: 01 Sep 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement