IT Management  >   Systems Operations  >  

Change Management Systems

RSS Feed    Add to Google    Add to My Yahoo!
Change Management SystemsReports
 
Best Practices for a Model-Driven Development Tool
sponsored by CA Technologies.
WHITE PAPER: In this white paper, discover best practices for a model-based development tool that enables you to quickly develop complex business applications based on Agile methods and reusable software components.
Posted: 11 Jun 2014 | Published: 31 Dec 2010

CA Technologies.

Case Study: Efficiently Distribute Software Deployments with WAN Optimization
sponsored by 1e Inc
CASE STUDY: Access this white paper that describes how Saint-Gobain, a building materials manufacturer, harnessed a change and configuration management tool to help them reduce expected branch server investment by 97 percent. Read on to learn how they were able to cut the number of branch servers from 6000 to 200.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

1e Inc

Overcoming the 5 Roadblocks to Workforce Management Success
sponsored by Workforce Software
WHITE PAPER: This informative guide highlights 5 key roadblocks that must be overcome to gain workforce management success.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Workforce Software

Semantic Integration & The Data Life Cycle
sponsored by Progress
WHITE PAPER: Read this paper to discover an alternative approach to data integration that ensures that not only is data correct and valid based on your business rules, but more importantly provides the means to fully operationalize those rules in a manner that is both intelligible to business and agile across all segments of the change lifecycle.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

Progress

White Paper: SCM: The "Blocking and Tackling" of IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Tripwire, Inc.

Overcoming virtualization security risks: Best practices
sponsored by Kaspersky Lab
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Kaspersky Lab

Case Study: How Bombardier Accelerated Its SAP Rollout With SAP Life Cycle Testing
sponsored by Worksoft
CASE STUDY: This case study demonstrates that some SAP test automation tools can expedite your SAP change management processes, especially if they offer highly reusable test scripts and are really suitable for use by business users.
Posted: 04 Nov 2011 | Published: 03 Nov 2011

Worksoft

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

eGuide: Applying business rules for more effective advanced case management
sponsored by IBM
EGUIDE: Read this expert e-guide to learn what business needs are driving the adoption of both business rules and case management technologies, how business rules technology is being put to use in case management and other areas, how to prepare for and implement rules in case management, and where business rules and case management trends are heading.
Posted: 11 Nov 2011 | Published: 07 Nov 2011

IBM

Crossing the DevOps chasm
sponsored by CA Technologies
WHITE PAPER: Every company wants to deliver apps faster and more cost efficiently, but development and operations remain separated by the challenging release step. Check out this white paper to learn how you can bridge the gaps in your delivery lifecycle in order to speed deployment times by adopting service virtualization, release automation, and more.
Posted: 17 May 2013 | Published: 17 May 2013

CA Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement