IT Management  >   Systems Operations  >  

Change and Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
Change and Configuration Management Reports
 
DevOps on IBM z Systems E-guide
sponsored by IBM
EGUIDE: This e-guide explains why adopting DevOps can result in more efficient and effective applications with continuous process improvement. Read now to ensure that any changes and enhancements to software are based on real customer feedback.
Posted: 29 May 2015 | Published: 29 May 2015

IBM

Driving Growth with Unified HCM
sponsored by Workday
WEBCAST: Access this webcast to hear how combining HR processes like human capital management, payroll, and time tracking enables you to drive business growth.
Posted: 20 Aug 2015 | Premiered: Jun 25, 2015

Workday

Global HR Cloud: Adapt to Changing HR Processes and Business Growth
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: A cloud HR system provides the flexibility to adapt as a company grows and changes. Read this white paper now to learn how the cloud can help you manage growth globally while adapting to local needs and supporting new or company-specific HR processes.
Posted: 11 May 2015 | Published: 11 May 2015

Oracle Corporation UK Ltd

CW500: BYOD Mistakes and Opportunities
sponsored by ComputerWeekly.com
PRESENTATION: Steve Trigg, independent consultant and former banking IT executive, draws on his experience advising major banks on BYOD  programmes in this presentation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

Tracking changes to requirements in Agile development
sponsored by IBM
EGUIDE: Agile environments encourage and embrace requirements changes. However, knowing how to effectively manage those changes can be a challenge. This tip guide provides Agile best practices that will ensure requirements are managed effectively through the development cycle.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

The key to Effective EHR Change Management
sponsored by HP & Intel®
WHITE PAPER: There are many factors to consider when rolling out an EHR implementation, and one of the most important is getting your people behind the change. This paper provides insight into where your staff may be in terms of resistance to or support for a new EHR system, and the necessary tools, training and support to transition successfully.
Posted: 01 Aug 2013 | Published: 15 Sep 2011

HP & Intel®

Kenco uses automation to streamline development
sponsored by IBM
CASE STUDY: To combat failed software development and configuration processes, Kenco wanted to implement a smarter, more collaborative application lifecycle management (ALM) process. Check out Kenco's case study to learn what tools they used to achieve this goal,
Posted: 07 Nov 2013 | Published: 08 Apr 2013

IBM

Don't Be a Hostage to Your ERP System
sponsored by CSC
WHITE PAPER: ERP systems are essential to the functioning of your business, but when it comes to customizing ERP systems to fit changing needs, it can be a lengthy, costly, risky process. Wouldn't it be great if you could get the process agility you need from your ERP system, without the complexity or the high price tag? Access this resource to find out how.
Posted: 12 Sep 2013 | Published: 01 Jan 2012

CSC

Bringing Sexy Back…to the Database
sponsored by Datical
WHITE PAPER: 75% of companies expect to perform some sort of manual intervention during application deployment - does this have to be the case? This insightful resource introduces a database change management platform that simplifies and automates database deployment and configuration for your most critical business applications, with low risk and uncertainty.
Posted: 16 Jul 2013 | Published: 16 Jul 2013

Datical

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement