IT Management  >   Systems Operations  >  

Change Management (Systems)

RSS Feed    Add to Google    Add to My Yahoo!
Change Management (Systems) Reports
 
The 2014 State of Digital Transformation
sponsored by ComputerWeekly.com
ANALYST BRIEF: The essence of digital transformation comes down to people this report extract from analyst group Altimeter reveals.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

ComputerWeekly.com

Effective ALM Planning; How to Appoint a New Management Team
sponsored by IBM
EBOOK: Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with application development goals, explain concepts to management, and improve quality. In this e-book, readers will learn keys to ALM planning and effective ways to introduce ALM to the organization.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

E-Guide: Top Considerations for Migrating to Exchange 2010
sponsored by Metalogix
EGUIDE: In this expert e-guide, discover what you need to know before migrating to Exchange Server 2010. Explore the new features and tools that Exchange boasts, and which features will not longer be supported. Find out the important prerequisites you'll need before making the transition.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Metalogix

Business Process Acceleration Within Oracle E-Business Suite
sponsored by UC4 Software, Inc
WHITE PAPER: This white paper examines how to overcome the challenges presented by the Oracle E-Business Suite and significantly increase your ROI.
Posted: 11 Aug 2011 | Published: 31 Dec 2010

UC4 Software, Inc

SAP System Build and Landscape Management Activities
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this white paper to learn how to simplify the often cumbersome, critical change management activities needed to simplify SAP solution deployments, increase operational performance, and decrease total cost of ownership (TCO) with a single, cohesive system that includes compute, network, and storage access components.
Posted: 22 Nov 2011 | Published: 30 Jun 2010

Cisco Systems, Inc.

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

Computer Weekly - 21 February 2012: Preparing for IPv6
sponsored by ComputerWeekly.com
EZINE: This week's digital magazine examines the challenges of migrating to IPv6 now the internet has run out of IPv4 addresses - a process every IT manager now faces. We also look into the IT issues facing smart meters and ask what will the beta launch of Gov.uk hold in store for public services?
Posted: 20 Feb 2012 | Published: 21 Feb 2012

ComputerWeekly.com

Managing Change in Agile Development
sponsored by HP Software
EGUIDE: Read this expert e-guide, compiled by SearchSoftwareQuality.com, to learn how to successfully manage change in agile development. Inside, discover how to automate change management while using agile practices, as well as eight tips to drive the adoption agile development.
Posted: 15 Aug 2011 | Published: 15 Aug 2011

HP Software

Has DevOps Missed the Boat?
sponsored by Datical
WHITE PAPER: As applications become more complex, and faster releases are expected, the chance that errors will occur is high - especially during database updates. In this resource, discover a software that simplifies database deployment and configuration for business-critical apps, as well as forecasts the impact of database changes before they're made.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

Datical

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Limited
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement