IT Management  >   Systems Operations  >  

Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective. Within this context, components of an information system are referred  … 
Definition continues below.
Configuration Management Reports
26 - 50 of 221 Matches Previous Page  |  Next Page
Mobile Configuration Management Functions for Successful MDM
sponsored by SearchSecurity.com
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

SearchSecurity.com

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School, you'll learn how the latest targeted attacks are developed, where your soft spots may be, how attackers are infiltrating data from your networks and what you can do to keep your critical data locked down.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

MDM Software: Benefits of Mobile Configuration Management
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by SearchSecurity.com
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

SearchSecurity.com

Webinar: Selecting the Right SCM Tool
sponsored by WANdisco
WEBCAST: Most SCM tools are not well-suited to support the industry trend towards WAN-based, globally distributed enterprise software development. This report and webinar will explore the reasons why these tools often struggle in a WAN environment and the key technologies for implementing solutions.
Posted: 23 Jun 2014 | Premiered: Jun 12, 2013

WANdisco

Webinar: The Big Picture - Unified Subversion & Git Access Control and Auditing
sponsored by WANdisco
WEBCAST: Consistent access control and auditing are now more important than ever for Agile workflows, corporate policies, and regulatory compliance. Until now, organizations using Subversion and Git had no way to standardize enforcement. This webinar focuses on new tools that enable company-wide standardization.
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Webinar: Scaling Git for the Enterprise
sponsored by WANdisco
WEBCAST: This webinar answers the most common questions when attempting to scale Git for the enterprise including how to manage thousands of users, monitor performance, and ensure compliance with regulatory standards
Posted: 20 Jun 2014 | Premiered: Dec 31, 2013

WANdisco

Best Practices for a Model-Driven Development Tool
sponsored by CA Technologies.
WHITE PAPER: In this white paper, discover best practices for a model-based development tool that enables you to quickly develop complex business applications based on Agile methods and reusable software components.
Posted: 11 Jun 2014 | Published: 31 Dec 2010

CA Technologies.

Operational Decision Management for Dummies
sponsored by IBM
EBOOK: Many organizations struggle with business rules that are hidden inside applications and processes, making them difficult to change. In this e-book from the "For Dummies" series, learn how Operational Decision Management (ODM) provides a set of tools and methods to automate your business decisions for increased accuracy and effectiveness.
Posted: 16 May 2014 | Published: 31 Dec 2013

IBM

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

La Jolla Institute for Allergy & Immunology: Customer Video
sponsored by Absolute
VIDEO: In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.
Posted: 12 Nov 2013 | Premiered: 12 Nov 2013

Absolute

Microsoft Exchange 2010 on Dell Systems: Small and Branch Office Configurations
sponsored by Dell EMC and Microsoft
WHITE PAPER: This whitepaper demonstrates the Dell Systems configuration models that are available for small and branch office configurations with Microsoft Exchange 2010. These solutions are especially designed for businesses of up to 1,000 mailboxes.
Posted: 11 Nov 2013 | Published: 01 Jan 2013

Dell EMC and Microsoft

Data Sheet: What's New in Red Hat Satellite 5.6?
sponsored by Red Hat
WHITE PAPER: Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

Red Hat

Don't Be a Hostage to Your ERP System
sponsored by CSC
WHITE PAPER: ERP systems are essential to the functioning of your business, but when it comes to customizing ERP systems to fit changing needs, it can be a lengthy, costly, risky process. Wouldn't it be great if you could get the process agility you need from your ERP system, without the complexity or the high price tag? Access this resource to find out how.
Posted: 12 Sep 2013 | Published: 01 Jan 2012

CSC

A Step Change in Development Efficiency
sponsored by MicroFocus
WHITE PAPER: This whitepaper helps you improve the efficiency and effectiveness of the mainframe development processes via simple-to-use, centrally-configurable graphical modeling.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

MicroFocus

The Cost of One Wrong Database Change: Can You Afford It?
sponsored by Datical
WHITE PAPER: Did you know there's a 78% chance that a database change or schema update will break an application or result in a loss of critical data? Check out this resource to see why database change management is a top priority for IT departments, and learn how a schema management technology can help accelerate app releases and eliminate downtime.
Posted: 25 Jul 2013 | Published: 25 Jul 2013

Datical

FAQ: Minimize SAP Testing Efforts
sponsored by IBM
PRESENTATION TRANSCRIPT: Trying to balance quality, speed and performance expectations is difficult enough, but when the pressure to deliver changes faster mounts, traditional QA and testing methods just don't cut it.Luckily, this resource is here to help - with answers to FAQs about how to minimize testing efforts in your SAP landscape.
Posted: 19 Jul 2013 | Published: 14 Jun 2013

IBM

Has DevOps Missed the Boat?
sponsored by Datical
WHITE PAPER: As applications become more complex, and faster releases are expected, the chance that errors will occur is high - especially during database updates. In this resource, discover a software that simplifies database deployment and configuration for business-critical apps, as well as forecasts the impact of database changes before they're made.
Posted: 18 Jul 2013 | Published: 18 Jul 2013

Datical

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
Posted: 14 Jun 2013 | Published: 30 Apr 2013

Citrix

10 Obvious Statements about Software Configuration and Change Management (And What They Mean For Your Organization)
sponsored by Remain Software
WHITE PAPER: This document will explore 10 important aspects that should be considered before proceeding with the implementation of a specific solution.
Posted: 07 Jun 2013 | Published: 16 Apr 2009

Remain Software

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations
sponsored by Dell EMC and Microsoft
WHITE PAPER: This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell EMC and Microsoft

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Dell 2-2-1 Solutions: High-Availability Virtualization with Dell PowerEdge R410 Servers
sponsored by Dell EMC and Microsoft
WHITE PAPER: This configuration guide walks you through the critical activities that take place during a virtualization deployment and describes a recommended reference architecture that can help you achieve your desired results. Learn more about the key features of this technology and how to properly enable them in this essential resource.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Dell EMC and Microsoft

Research Summary: Network Management Megatrends 2012
sponsored by EMC Corporation
WHITE PAPER: Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use.
Posted: 30 Aug 2012 | Published: 04 Jun 2012

EMC Corporation

Transforming Operations Management Through Service Assurance with EMC
sponsored by EMC Corporation
WEBCAST: This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services.
Posted: 30 Aug 2012 | Premiered: Aug 30, 2012

EMC Corporation
26 - 50 of 221 Matches Previous Page    1 2 3 4 5    Next Page
 
CONFIGURATION MANAGEMENT DEFINITION (continued): …  to as configuration items (CI). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management seek to specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion. The IT Infrastructure Library (ITIL) best practices standards include specifications for configuration management. According to ITIL specifications, the four major tasks of configuration management are: Identification of configuration items to be included in … 
Configuration Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement