IT Management  >   Systems Operations  >  

Change Management (Systems)

RSS Feed    Add to Google    Add to My Yahoo!
Change Management (Systems)Reports
 
CW500: BYOD Mistakes and Opportunities
sponsored by ComputerWeekly.com
PRESENTATION: Steve Trigg, independent consultant and former banking IT executive, draws on his experience advising major banks on BYOD  programmes in this presentation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

Open Source BPM Hits The Mark For Delivering New Class Of Process Apps
sponsored by Red Hat
WHITE PAPER: In this report from Forrester Research, Inc., explore the various challenges that modern application developers face and learn why savvy dev teams are considering open source BPM as an alternative to hand-coding and as a viable way to overcome these issues.
Posted: 12 May 2014 | Published: 31 Mar 2014

Red Hat

Integrate Rational ALM applications with SAP Solution Manager
sponsored by IBM
WHITE PAPER: To support effective collaboration, IT teams need to unify and expedite the delivery of SAP and other critical business systems. In this resource, learn how to leverage an ALM platform and other tools that help your respond to the difficulty of managing change in SAP environments quickly and without breaking the bank.
Posted: 09 Aug 2013 | Published: 31 Dec 2012

IBM

Has DevOps Missed the Boat?
sponsored by Datical
WHITE PAPER: As applications become more complex, and faster releases are expected, the chance that errors will occur is high - especially during database updates. In this resource, discover a software that simplifies database deployment and configuration for business-critical apps, as well as forecasts the impact of database changes before they're made.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

Datical

Testing Tools Ensure Defect-free Applications for Germany's Federal Employment Agency
sponsored by Borland, Micro Focus
CASE STUDY: View this case study to learn how the IT department of Germany's Federal Employment Agency implemented a suite of testing tools to test the Agency's applications and ensure flawless, defect-free performance.
Posted: 24 Apr 2014 | Published: 31 Dec 2012

Borland, Micro Focus

eGuide: Strategies for building the best advanced case management architecture, Part I
sponsored by IBM
EGUIDE: Designing a case management architecture is more of an art—really, a balancing act—than a science. In this e-guide, readers will learn to address key considerations involved in designing an effective case management architecture that extends across the enterprise to enable better collaboration and decision-making.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

IBM

Kenco uses automation to streamline development
sponsored by IBM
CASE STUDY: To combat failed software development and configuration processes, Kenco wanted to implement a smarter, more collaborative application lifecycle management (ALM) process. Check out Kenco's case study to learn what tools they used to achieve this goal,
Posted: 07 Nov 2013 | Published: 08 Apr 2013

IBM

Microsoft® Office Migration Guide
sponsored by Ontuitive
VIDEO: This essential resource highlights five important reasons to pull off an error-free Office migration, and reviews best practices that can help your organization seamlessly upgrade to the newest Office suite.
Posted: 13 Jun 2012 | Premiered: 07 Jun 2012

Ontuitive

Business Agility Realized
sponsored by IBM
WHITE PAPER: This brief provides insights through real life customer examples on how to optimize your business processes and decisions to transform your business; leverage rapid integration for an interconnected world; deliver applications that maximize investments; accelerate agility with an intelligent and flexible application infrastructure.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

IBM

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement