IT Management  >   Systems Operations  >  

Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective. Within this context, components of an information system are referred  … 
Definition continues below.
Configuration ManagementReports
151 - 175 of 200 Matches Previous Page  | Next Page
eGuide: Technology Management Strategies for the Midmarket CIO
sponsored by Hewlett-Packard Company
EGUIDE: Learn how midmarket CIOs are re-examining computer infrastructure and realizing a return on their investment while grappling with new challenges.
Posted: 08 Dec 2008 | Published: 08 Dec 2008

Hewlett-Packard Company

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008
sponsored by Microsoft
WHITE PAPER: This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

Microsoft

Hyper-V Deployment and Best Practices
sponsored by Microsoft
WEBCAST: In this webcast a Senior Product Manager from the Windows Virtualization team discusses the Hyper-V virtualization capabilities built into Windows Server 2008. It offers an overview of system requirements, and best practices for successful depl...
Posted: 05 Dec 2008 | Premiered: Dec 5, 2008

Microsoft

Five Ways Deploying Windows Vista Just Got Easier
sponsored by Microsoft
TECHNICAL ARTICLE: This article explores some of the new capabilities of Windows Vista, our new set of deployment tools, and ways that you can benefit from these tools to make the process of deploying Windows Vista much easier.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

Microsoft

The Complete Network Assessment
sponsored by Dorado Software
WHITE PAPER: This paper gives a brief overview on how a complete network inventory assessment can improve the health & security of network.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Dorado Software

Virtualization and Automation Drive Dynamic Data Centers
sponsored by CA Technologies.
WHITE PAPER: Learn how virtualization and automation in the data center will lead to better customerexperience, reduced environmental impact and increased capacity for future services.
Posted: 31 Oct 2008 | Published: 30 Oct 2008

CA Technologies.

CA SPECTRUM® Redefining Network Fault Management
sponsored by CA Technologies.
PRODUCT LITERATURE: CA SPECTRUM® Network Fault Manager software delivers fault and configuration management across diverse, multi-technology networks to assure the availability of critical network services that are essential for your business applications.
Posted: 31 Oct 2008 | Published: 30 Oct 2008

CA Technologies.

Elavon Achieves Greater Business Agility with CA Data Center Automation
sponsored by CA Technologies.
WHITE PAPER: Learn about a real-life example of how an automation architecture design that consolidates redundant, underperforming assets enabled one organization to meet the demands of an aggressive growth strategy while delivering high levels of service quality.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

CA Technologies.

CA Data Center Automation Manager Product Brief: A Tactical Approach to Simplify Service Delivery in the Data Center
sponsored by CA Technologies.
PRODUCT LITERATURE: Learn how automating critical operational processes frees up your IT staff to focus on innovation and strategic initiatives, reduces downtime, improves delivery lead time, and helps conserve valuable data center space and power resources.
Posted: 29 Oct 2008 | Published: 29 Oct 2008

CA Technologies.

ITIL® v3: What It Is and Why You Should Care
sponsored by Global Knowledge
WHITE PAPER: This paper explains ITIL by describing its benefits, where it comes from, why you need to know about it, which types of IT organization can benefit from using it, and how to get started.
Posted: 14 Oct 2008 | Published: 11 Oct 2008

Global Knowledge

Configuration Audit and Control: 10 Critical Factors to Change and Configuration Management Success
sponsored by Tripwire, Inc.
WHITE PAPER: As businesses have instituted internal, industry, and government mandated regulatory compliance, the need for audit data to prove conformity has also become a necessity. Read this white paper to learn how configuration audit and control provides a single, independent source for enforcing and reporting on a change policy across an organization.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Tripwire, Inc.

Security Vs. Flexibility: Must IT Management Choose?
sponsored by Faronics
WHITE PAPER: This white paper focuses on how IT Managers can leverage Centralized Configuration Management (CCM) tools along with other techniques and tools to have it all: security, a uniform standard, and flexibility when needed.
Posted: 22 Aug 2008 | Published: 22 Aug 2008

Faronics

End User Performance - Building and Maintaining ROI
sponsored by SAP America, Inc.
WHITE PAPER: In this white paper, explore how organizations are achieving strong returns on investment on their information technologie endeavors and investments by emphasizing user performance.
Posted: 06 Aug 2008 | Published: 01 Jan 2006

SAP America, Inc.

Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER: This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008

IBM

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability
sponsored by Tripwire, Inc.
WHITE PAPER: Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Tripwire, Inc.

ESG: A Phased Approach to Network Access Control (NAC)
sponsored by Symantec Corporation
WHITE PAPER: Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

Putting Security First in the Newly Virtualized World
sponsored by Lumension
WHITE PAPER: At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches
Posted: 25 Jul 2008 | Published: 07 Jul 2008

Lumension

LogRhythm and NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.
Posted: 25 Jul 2008 | Published: 01 Jul 2008

LogRhythm, Inc.

Building Multi-language Applications with Visual Studio
sponsored by OpenMake Software
WHITE PAPER: This white paper discusses the steps necessary to improve software build functionality of Microsoft Visual Studio 2005 and 2008 with Microsoft Team Foundation Server.
Posted: 22 Apr 2008 | Published: 01 Jan 2007

OpenMake Software

Improving Agile Development with Continuous Build Scripts & Build Avoidance
sponsored by OpenMake Software
WHITE PAPER: This white paper discusses how realize the full benefits of continuous integration in agile development.
Posted: 22 Apr 2008 | Published: 01 Apr 2008

OpenMake Software

Leading Energy Utility Company Increases Efficiency Through PeopleSoft Financials and HRMS Systems Upgrades
sponsored by Hexaware Technologies
WHITE PAPER: Explore the four phases of the lifecycle for the upgrade methodology of an on-site delivery model that provides upgrade services to enable one organization to achieve its business objects.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Hexaware Technologies

ASG-Rochade the Leading Metadata Repository
sponsored by ASG Software Solutions
SOFTWARE LISTING: ASG-Rochade is a metadata management solution for large and medium-sized organizations; it is a strategic, facilitating technology that manages information about data and systems across your enterprise.
Posted: 27 Mar 2008 | Published: 01 Mar 2008

ASG Software Solutions

EK1000 Slap Shot Evaluation Kit Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: This brief provides IT administrators with key information on how to manage their PC environments with and maximize end-user productivity.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Benefits of IPControl Deployment
sponsored by BT Diamond IP
CASE STUDY: Implementation of IPControl led to an immediate € 40,000 reduction in network maintenance costs.
Posted: 08 Feb 2008 | Published: 30 Jan 2008

BT Diamond IP

Cirrus Configuration Manager
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Manager.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

SolarWinds, Inc.
151 - 175 of 200 Matches Previous Page    5 6 7 8    Next Page
 
CONFIGURATION MANAGEMENT DEFINITION (continued): …  to as configuration items (CI). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management seek to specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion. The IT Infrastructure Library (ITIL) best practices standards include specifications for configuration management. According to ITIL specifications, the four major tasks of configuration management are: Identification of configuration items to be included in … 
Configuration Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement