IT Management  >   Systems Operations  >  

Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective. Within this context, components of an information system are referred  … 
Definition continues below.
Configuration Management Reports
1 - 25 of 212 Matches Previous Page  |  Next Page
Configuration Management: What You Need to Know
sponsored by Cherwell
ESSENTIAL GUIDE: Now that IT is constantly increasing in complexity, IT professionals need to keep up with the rapid dynamics of the market. Access this e-guide to learn about the importance of a configuration management system and how to evaluate these systems to find the one that best meets your organization's IT needs.
Posted: 14 Jun 2017 | Published: 12 Jun 2017

Cherwell

A configuration management plan needs to be a custom fit
sponsored by SearchITOperations
EBOOK: A successful configuration management process means looking at a lot of tools and finding one that fits comfortably with your team and business goals.
Posted: 28 Apr 2017 | Published: 28 Apr 2017


How to Build a High-Performing IT Team
sponsored by Puppet
EBOOK: DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done — it's about continual learning and improvement rather than an end state. To help you on your DevOps journey, this handbook covers 5 essential phases from building a business case to planning your DevOps implementation.
Posted: 10 Mar 2017 | Published: 10 Mar 2017

Puppet

Geek Guide: Containers 101
sponsored by Puppet
EBOOK: This guide defines what containers are, how they work, and how developers can use them for rapid development initiatives. Learn about how to optimize the value of containers, what's involved in managing them, how configuration management applies to them, and more.
Posted: 09 Mar 2017 | Published: 09 Mar 2017

Puppet

Maximizing IT Security with Configuration Management
sponsored by Puppet
WHITE PAPER: This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including the creation of a Standard Operating Environment (SOE), reporting on and control of configuration drift, enhanced change remediation, and more.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

Puppet

The DevOps Transformation at Gannett
sponsored by Chef Software
CASE STUDY: This case study explores how Gannett connected previously siloed data, resolved issues with shadow IT, and enabled access to the cloud to help deploy their apps faster and with more scalability. Find out how they leveraged automation and used a DevOps approach to support faster, more efficient deployments.
Posted: 21 Oct 2016 | Published: 29 Feb 2016

Chef Software

Build a Reliable, Accurate CMDB by Addressing Data Quality
sponsored by BDNA
WHITE PAPER: Discover the top data quality issues derailing your configuration management database (CMDB) initiatives. Learn how you can build and maintain an accurate, reliable CMDB by taking the steps to address poor data quality.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

BDNA

Microsoft Service Manager Simplified
sponsored by Global Knowledge
WHITE PAPER: Through the use of automation, compliance, self-service portal, and standardization, Microsoft's System Center Service Manager can support the best practices found in the Information Technology Infrastructure Library (ITIL®) and the Microsoft Operations Framework (MOF).
Posted: 13 Mar 2015 | Published: 13 Mar 2015

Global Knowledge

Infrastructure as Code, Demystifying the Cloud Service API Top IT's DevOps Challenges
sponsored by Datera
EGUIDE: Learn how to overcome IT's top DevOps challenges—including infrastructure automation and the risks cloud service APIs pose. Additionally, you'll gain a developer's perspective on creating agile Docker containers for DevOps, with varied approaches storage vendors take in managing them.
Posted: 16 Jan 2017 | Published: 11 Jan 2017

Datera

Automate and Orchestrate Your IT Operations
sponsored by SearchITOperations
EBOOK: Even though configuration management systems are set to automate upgrades and save time, but are they right for every IT organization? This handbook examines how your IT organization should use configuration management to test new releases and automate certain tasks.
Posted: 24 Jun 2016 | Published: 24 Jun 2016


Release Automation for Complex, Multi-Tier Deployments
sponsored by CA Technologies.
WHITE PAPER: How can you minimize bottlenecks to rapidly and consistently deliver apps, without missing errors that lead to failures? Learn how release automation can help you deploy app releases faster and more frequently without sacrificing quality.
Posted: 08 Apr 2016 | Published: 31 Dec 2014

CA Technologies.

How Middleware Software Speeds Application Delivery
sponsored by Red Hat
EGUIDE: This e-guide provides an in-depth Q&A session with middleware software experts Akbar Aziz and Calvin Martin about middleware automation. Learn how middleware automation speeds application delivery, simplifies configuration management, and allows microservices, containers, and cloud services to be introduced into enterprise architectures.
Posted: 25 Feb 2016 | Published: 22 Feb 2016

Red Hat

Seven Principles for Achieving High Performance and Scalability for Information Integration
sponsored by IBM
WHITE PAPER: Read this white paper for information integration success stories. Also, find critical success criteria for an architecture's scalability.
Posted: 26 Jan 2015 | Published: 30 Apr 2014

IBM

The Benefits of ITSM Principles
sponsored by CDW Corporation
EGUIDE: In this expert e-guide, examine the various benefits that an ITSM (IT service management) approach can provide an organization. Additionally, learn advice on how to integrate configuration management and IT asset management to optimize benefits and improve performance.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

CDW Corporation

Avoiding Audits - How to Get Of Software Vendors’ Radar
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Software license audits bog down operations and can be costly, though the ultimate sacrifice of the audit process is the relationship with customers. View this whitepaper to identify the 4 key triggers for being identified by a vendor for an audit, and how to alter habits to avoid unjust scrutiny.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Enterprise

10 Common Problems that Application Performance Management Helps You Solve
sponsored by Riverbed Technology, Inc.
WHITE PAPER: This white paper breaks down the top ten quality and performance issues that application performance management can help to solve by detecting applications' performance problems and their causes.
Posted: 01 Aug 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Infographic: The Total Economic Impact of WANdisco SVN MultiSite
sponsored by WANdisco
WHITE PAPER: A recent Forrester Research Total Economic Impact (TEI) Report revealed that SVN MultiSite delivered a return on investment (ROI) of 357% with a payback period of less than two months. View this infographic to get an easy-to-read breakdown of the key findings of Forrester's report.
Posted: 02 Jul 2014 | Published: 02 Jul 2014

WANdisco

Service-Oriented Configuration Management
sponsored by Pangea Systems
WHITE PAPER: This whitepaper details the core functionality and key benefits of service-oriented configuration management and offers up a four-step approach for implementation.
Posted: 26 Jun 2014 | Published: 10 Jun 2010

Pangea Systems

Webinar: Selecting the Right SCM Tool
sponsored by WANdisco
WEBCAST: Most SCM tools are not well-suited to support the industry trend towards WAN-based, globally distributed enterprise software development. This report and webinar will explore the reasons why these tools often struggle in a WAN environment and the key technologies for implementing solutions.
Posted: 23 Jun 2014 | Premiered: Jun 12, 2013

WANdisco

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Webinar: Scaling Git for the Enterprise
sponsored by WANdisco
WEBCAST: This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Best Practices for a Model-Driven Development Tool
sponsored by CA Technologies.
WHITE PAPER: In this white paper, discover best practices for a model-based development tool that enables you to quickly develop complex business applications based on Agile methods and reusable software components.
Posted: 11 Jun 2014 | Published: 31 Dec 2010

CA Technologies.

Operational Decision Management for Dummies
sponsored by IBM
EBOOK: Many organizations struggle with business rules that are hidden inside applications and processes, making them difficult to change. In this e-book from the "For Dummies" series, learn how Operational Decision Management (ODM) provides a set of tools and methods to automate your business decisions for increased accuracy and effectiveness.
Posted: 16 May 2014 | Published: 31 Dec 2013

IBM

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute
1 - 25 of 212 Matches Previous Page    1 2 3 4    Next Page
 
CONFIGURATION MANAGEMENT DEFINITION (continued): …  to as configuration items (CI). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management seek to specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion. The IT Infrastructure Library (ITIL) best practices standards include specifications for configuration management. According to ITIL specifications, the four major tasks of configuration management are: Identification of configuration items to be included in … 
Configuration Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement