IT Management  >   Systems Operations  >  

Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective. Within this context, components of an information system are referred  … 
Definition continues below.
Configuration ManagementReports
26 - 50 of 212 Matches Previous Page  | Next Page
Mobile Configuration Management Functions for Successful MDM
sponsored by SearchSecurity.com
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013


MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 01 Jun 2012 | Published: 01 Jun 2012

IBM

Exploring cloud Security as a Service options
sponsored by SearchSecurity.com
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

SearchSecurity.com

CW Buyer's Guide: IT Tools
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly buyer’s guide to IT tools shows how you can use software and systems to improve the running of your IT department.
Posted: 08 May 2012 | Published: 08 May 2012

ComputerWeekly.com

The Cost of One Wrong Database Change: Can You Afford It?
sponsored by Datical
WHITE PAPER: Did you know there's a 78% chance that a database change or schema update will break an application or result in a loss of critical data? Check out this resource to see why database change management is a top priority for IT departments, and learn how a schema management technology can help accelerate app releases and eliminate downtime.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

Datical

FAQ: Minimize SAP Testing Efforts
sponsored by IBM
PRESENTATION TRANSCRIPT: Trying to balance quality, speed and performance expectations is difficult enough, but when the pressure to deliver changes faster mounts, traditional QA and testing methods just don't cut it.Luckily, this resource is here to help - with answers to FAQs about how to minimize testing efforts in your SAP landscape.
Posted: 19 Jul 2013 | Published: 14 Jun 2013

IBM

Has DevOps Missed the Boat?
sponsored by Datical
WHITE PAPER: As applications become more complex, and faster releases are expected, the chance that errors will occur is high - especially during database updates. In this resource, discover a software that simplifies database deployment and configuration for business-critical apps, as well as forecasts the impact of database changes before they're made.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

Datical

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
Posted: 14 Jun 2013 | Published: 30 Apr 2013

Citrix

10 Obvious Statements about Software Configuration and Change Management (And What They Mean For Your Organization)
sponsored by Remain Software
WHITE PAPER: This document will explore 10 important aspects that should be considered before proceeding with the implementation of a specific solution.
Posted: 07 Jun 2013 | Published: 16 Apr 2009

Remain Software

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Dell 2-2-1 Solutions: High-Availability Virtualization with Dell PowerEdge R410 Servers
sponsored by Dell and Microsoft
WHITE PAPER: This configuration guide walks you through the critical activities that take place during a virtualization deployment and describes a recommended reference architecture that can help you achieve your desired results. Learn more about the key features of this technology and how to properly enable them in this essential resource.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Dell and Microsoft

Research Summary: Network Management Megatrends 2012
sponsored by EMC Corporation
WHITE PAPER: Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use.
Posted: 30 Aug 2012 | Published: 04 Jun 2012

EMC Corporation

Transforming Operations Management Through Service Assurance with EMC
sponsored by EMC Corporation
WEBCAST: This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services.
Posted: 30 Aug 2012 | Premiered: Aug 30, 2012

EMC Corporation

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Taking Enterprise Application Integration into the Cloud
sponsored by Dell, Inc.
WHITE PAPER: Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Dell, Inc.

SearchSoftwareQuality.com E-Guide: Best Practices for Testing and QA
sponsored by SAP America, Inc.
EGUIDE: This expert e-guide teaches QA managers ten things to know for successful configuration testing and provides guidance for overcoming five common hurdles of dealing with QA-reluctant CIOs.
Posted: 30 May 2012 | Published: 25 May 2012

SAP America, Inc.

Orchestrating Mainframe and Distributed SCCM and Release Management
sponsored by SERENA Software, Inc.
WHITE PAPER: Read this white paper to find an integrated approach to software change and configuration management. Learn how to effectively balance the need for change v. availability of resources and make rational business decisions without disrupting your audit trail.
Posted: 23 May 2012 | Published: 23 May 2012

SERENA Software, Inc.

AQS, Inc. Major Software Delivery Lifecycle Improvements at AQS, Inc. with StarTeam
sponsored by Micro Focus
CASE STUDY: When software company AQS, Inc. needed to build consistency in their source code management and automate change processes they leveraged a change and configuration management system. Read this case study to learn the benefits they were able to achieve.
Posted: 17 May 2012 | Published: 16 May 2012

Micro Focus

Overcoming virtualization security risks: Best practices
sponsored by Kaspersky Lab
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Kaspersky Lab
26 - 50 of 212 Matches Previous Page    1 2 3 4 5    Next Page
 
CONFIGURATION MANAGEMENT DEFINITION (continued): …  to as configuration items (CI). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management seek to specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion. The IT Infrastructure Library (ITIL) best practices standards include specifications for configuration management. According to ITIL specifications, the four major tasks of configuration management are: Identification of configuration items to be included in … 
Configuration Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement