IT Management  >   Systems Operations  >  

Change and Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
Change and Configuration ManagementReports
 
Extend The Benefits of Automation across the Enterprise
sponsored by Hewlett-Packard Company
VIRTUAL ENVIRONMENT: In this webcast, learn how to successfully implement automation within the enterprise with an "automation center of excellence (CoE)" that ensures IT delivers effective, efficient services.
Posted: 11 Jun 2014 | Premiered: 09 Jun 2014

Hewlett-Packard Company

Testing Tools Ensure Defect-free Applications for Germany's Federal Employment Agency
sponsored by Borland, Micro Focus
CASE STUDY: View this case study to learn how the IT department of Germany's Federal Employment Agency implemented a suite of testing tools to test the Agency's applications and ensure flawless, defect-free performance.
Posted: 24 Apr 2014 | Published: 31 Dec 2012

Borland, Micro Focus

Moving users from existing IBM Notes and Domino infrastructures to IBM SmartCloud Notes
sponsored by IBM
WHITE PAPER: In this brief paper, learn how users are migrating from existing IBM Notes and Domino infrastructures to IBM SmartCloud Notes.
Posted: 04 Sep 2014 | Published: 31 Dec 2012

IBM

Managing IT projects for business change. Dealing with trouble.
sponsored by ComputerWeekly.com
PRESENTATION: Jeff Morgan and Chris Dale offer advice on managing unanticipated events that can disrupt IT projects in this extract from their book, Managing IT Projects for Business Change.
Posted: 22 Apr 2014 | Published: 22 Apr 2014

ComputerWeekly.com

Improve IT Visibility, Avoid Change Failures
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative white paper introduces an IT service management (ITSM) tool that automates the mapping of applications, infrastructure components, and their dependencies, resulting in a simplified approach to change and configuration management.
Posted: 02 Jun 2014 | Published: 31 Dec 2012

Hewlett-Packard Company

Five guidelines for avoiding common social-collaboration challenges in case management
sponsored by IBM
EGUIDE: This Tip Guide offers expert advice for avoiding social/collaborative headaches in case management. Also included are key findings from ebizQ.com's own just-completed survey of business and IT professionals who are using case management at their organization.
Posted: 21 Nov 2011 | Published: 17 Nov 2011

IBM

Semantic Integration & The Data Life Cycle
sponsored by Progress
WHITE PAPER: Read this paper to discover an alternative approach to data integration that ensures that not only is data correct and valid based on your business rules, but more importantly provides the means to fully operationalize those rules in a manner that is both intelligible to business and agile across all segments of the change lifecycle.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

Progress

FAQ: Minimize SAP Testing Efforts
sponsored by IBM
PRESENTATION TRANSCRIPT: Trying to balance quality, speed and performance expectations is difficult enough, but when the pressure to deliver changes faster mounts, traditional QA and testing methods just don't cut it.Luckily, this resource is here to help - with answers to FAQs about how to minimize testing efforts in your SAP landscape.
Posted: 19 Jul 2013 | Published: 14 Jun 2013

IBM

Definitive Guide to Exchange Server 2010 Migration Chapter 5: Exchange 2010: Keeping up Appearances
sponsored by Mimecast
EGUIDE: Keeping Exchange Server 2010 running at full torque requires diligent management and administration. This e-guide examines some of the most common performance issues and explains how to mitigate them. Exchange MVP Andy Grogan also details best practices you should follow to prevent any performance setbacks.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

Mimecast

Implementing an Effective Vulnerability Management Program
sponsored by Tenable Network Security
WHITE PAPER: Access this white paper to gain insight into best practices for continuous vulnerability management. Find out how you can ensure security of your systems and why you should be implementing continuous vulnerability management.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Tenable Network Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement