IT Management  >   Systems Operations  >  

Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective. Within this context, components of an information system are referred  … 
Definition continues below.
Configuration ManagementReports
176 - 200 of 212 Matches Previous Page  | Next Page
Driving Business Success with Software Reuse
sponsored by IBM
WHITE PAPER: This white paper explains how Software Reuse and its underlying fundamentals have evolved dramatically. It also discusses the benefits of constructing critical enterprise software applications through reusable parts.
Posted: 30 Jul 2008 | Published: 01 Mar 2008

IBM

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability
sponsored by Tripwire, Inc.
WHITE PAPER: Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Tripwire, Inc.

ESG: A Phased Approach to Network Access Control (NAC)
sponsored by Symantec Corporation
WHITE PAPER: Learn how Symantec Network Access Control can provide the secret to NAC success by offering a practical, phased implementation approach and by aligning NAC with business requirements.
Posted: 29 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

Putting Security First in the Newly Virtualized World
sponsored by Lumension
WHITE PAPER: At Lumension Security are experts are in tune with the latest security problems posed by virtualization. In a new and largely untested IT world it is necessary to apply security at every stage of the process, keeping it safe from hackers and data breaches
Posted: 25 Jul 2008 | Published: 07 Jul 2008

Lumension

LogRhythm and NERC CIP Compliance
sponsored by LogRhythm, Inc.
WHITE PAPER: LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs, it automatically performs the first level of log analysis and also ensures you to meet your reporting requirements.
Posted: 25 Jul 2008 | Published: 01 Jul 2008

LogRhythm, Inc.

Building Multi-language Applications with Visual Studio
sponsored by OpenMake Software
WHITE PAPER: This white paper discusses the steps necessary to improve software build functionality of Microsoft Visual Studio 2005 and 2008 with Microsoft Team Foundation Server.
Posted: 22 Apr 2008 | Published: 01 Jan 2007

OpenMake Software

Improving Agile Development with Continuous Build Scripts & Build Avoidance
sponsored by OpenMake Software
WHITE PAPER: This white paper discusses how realize the full benefits of continuous integration in agile development.
Posted: 22 Apr 2008 | Published: 01 Apr 2008

OpenMake Software

Leading Energy Utility Company Increases Efficiency Through PeopleSoft Financials and HRMS Systems Upgrades
sponsored by Hexaware Technologies
WHITE PAPER: Explore the four phases of the lifecycle for the upgrade methodology of an on-site delivery model that provides upgrade services to enable one organization to achieve its business objects.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

Hexaware Technologies

ASG-Rochade the Leading Metadata Repository
sponsored by ASG Software Solutions
SOFTWARE LISTING: ASG-Rochade is a metadata management solution for large and medium-sized organizations; it is a strategic, facilitating technology that manages information about data and systems across your enterprise.
Posted: 27 Mar 2008 | Published: 01 Mar 2008

ASG Software Solutions

EK1000 Slap Shot Evaluation Kit Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: This brief provides IT administrators with key information on how to manage their PC environments with and maximize end-user productivity.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Benefits of IPControl Deployment
sponsored by BT Diamond IP
CASE STUDY: Implementation of IPControl led to an immediate € 40,000 reduction in network maintenance costs.
Posted: 08 Feb 2008 | Published: 30 Jan 2008

BT Diamond IP

Cirrus Configuration Manager
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Cirrus Configuration Manager.
Posted: 25 Jan 2008 | Premiered: 25 Jan 2008

SolarWinds, Inc.

Business Mashups: Addressing the Long Tail of Applications Development
sponsored by SERENA Software, Inc.
WHITE PAPER: A mashup is a web application that combines data from more than one source into a single integrated tool. Learn how Business Mashups can help Business Owners and IT unlock the potential found in this so-called "long tail" of applications.
Posted: 12 Dec 2007 | Published: 01 Sep 2007

SERENA Software, Inc.

Deploying Microsoft® SQL Server™ 2005 Business Intelligence and Data Warehousing Solutions on Dell™ PowerEdge™ Servers and Dell™ PowerVault™ Storage
sponsored by Dell, Inc.
WHITE PAPER: This white paper provides an architectural overview and configuration guidelines for deploying Microsoft SQL Server 2005 Business Intelligence and Data Warehouse technologies on Dell PowerEdge servers with Dell PowerVault storage.
Posted: 05 Dec 2007 | Published: 01 Sep 2007

Dell, Inc.

Performance of Microsoft® SQL Server&#153 2005 Business Intelligence and Data Warehousing Solutions on Dell™ PowerEdge™ Servers and Dell™ PowerVault™ Storage
sponsored by Dell, Inc.
WHITE PAPER: This performance white paper illustrates the efficiencies of deploying SQL Server 2005 Business Intelligence and Data Warehousing technologies on Dell PowerEdge servers and Dell PowerVault MD1000 storage arrays
Posted: 05 Dec 2007 | Published: 01 Sep 2007

Dell, Inc.

The Intelligent Choice for Business Intelligence
sponsored by Dell, Inc.
WHITE PAPER: Learn how Dell has partnered with Microsoft to create three validated partner reference configurations for Business Intelligence and Data Warehousing. This white paper discusses BI and DW applications for SQL Server 2005.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

Dell, Inc.

Enterprise Change Management: Blending Technology with Best Practices to Improve IT Efficiency & Achieve Compliance
sponsored by SunView Software Inc.
WHITE PAPER: Effective change management is required to rapidly and successfully respond to new challenges. Get an in-depth explanation of the available technologies and best practice frameworks that exist to help organizations control change activities.
Posted: 04 Sep 2007 | Published: 01 Sep 2007

SunView Software Inc.

Leveraging Agent and Agentless Technology for Effective Operations Management
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper learn the benefits of using agent-based and agentless technologies to monitor infrastructure performance and availability. Also read about the total cost of ownership for both agent-based solutions as well as agentless techn...
Posted: 24 Aug 2007 | Published: 01 Apr 2007

Hewlett-Packard Company

Seamless Physical and Virtual Server Management
sponsored by Hewlett-Packard Company
WHITE PAPER: Server virtualization has the ability to benefit nearly all data centers, but these benefits can not be realized if the virtual servers are implemented and managed improperly. This paper provides guidance on optimal virtualization strategies.
Posted: 08 Aug 2007 | Published: 16 Nov 2006

Hewlett-Packard Company

IT Asset Management: Saving Money, Reducing Risk
sponsored by NetSupport, Inc.
WHITE PAPER: Learn how IT asset management works and how to deliver a system for controlling costs and proving regulatory compliance. Read this white paper that details how IT asset management improves technology return on investment and safeguards organizations.
Posted: 17 Jul 2007 | Published: 01 Jul 2007

NetSupport, Inc.

The Shortcut Guide to Network Management for the Mid-Market
sponsored by SolarWinds, Inc.
WHITE PAPER: This 4-chapter guide was written specifically for network engineers, offering valuable insight into real-world technologies and processes for implementing centralized management and monitoring of your network infrastructure.
Posted: 16 Jul 2007 | Published: 01 Mar 2007

SolarWinds, Inc.

Vulnerability Management: Making Risk Visible and Remediation Automatic
sponsored by Shavlik Technologies
WHITE PAPER: This paper details how to set vulnerability management policies and identify risks within your organization. You will also learn more about how to detect and remediate patch or configuration problems.
Posted: 01 May 2007 | Published: 01 Apr 2007

Shavlik Technologies

Enabling the Enterprise Data Center with Next Generation, Dynamic Event Based Automation
sponsored by CA Technologies.
PODCAST: Check out this podcast to hear more about the role workload and event-based automation should be playing in your data center management strategy.
Posted: 28 Mar 2007 | Premiered: Mar 29, 2007, 09:00 EDT (13:00 GMT)

CA Technologies.

Enterprise Manager: Why experts rave about its Oracle DB management
sponsored by Oracle Corporation
WEBCAST: Attend this free Webcast to learn how Oracle Enterprise Manager can help you manage your database infrastructure more effectively.
Posted: 21 Mar 2007 | Premiered: Mar 29, 2007, 14:00 EDT (18:00 GMT)

Oracle Corporation

Apply the ITIL Framework with Confidence
sponsored by TechExcel
WHITE PAPER: This whitepaper explains how ITIL provides the foundation for quality IT service management. It actively supports corporate goals by offering services that are based on efficient principles and adequately fulfilling business requirements.
Posted: 12 Mar 2007 | Published: 01 Mar 2007

TechExcel
176 - 200 of 212 Matches Previous Page    6 7 8 9    Next Page
 
CONFIGURATION MANAGEMENT DEFINITION (continued): …  to as configuration items (CI). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management seek to specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion. The IT Infrastructure Library (ITIL) best practices standards include specifications for configuration management. According to ITIL specifications, the four major tasks of configuration management are: Identification of configuration items to be included in … 
Configuration Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement