Configuration Management Reports

MDM Software: Benefits of Mobile Configuration Management
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by TechTarget Security
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

TechTarget Security

Exploring cloud Security as a Service options
sponsored by TechTarget Security
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

TechTarget Security

Mobile Configuration Management Functions for Successful MDM
sponsored by Citrix Systems, Inc.
EGUIDE: This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Citrix Systems, Inc.

Dell 2-2-1 Solutions: High-Availability Virtualization with Dell PowerEdge R410 Servers
sponsored by Dell EMC and Microsoft
WHITE PAPER: This configuration guide walks you through the critical activities that take place during a virtualization deployment and describes a recommended reference architecture that can help you achieve your desired results. Learn more about the key features of this technology and how to properly enable them in this essential resource.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

Dell EMC and Microsoft

Research Summary: Network Management Megatrends 2012
sponsored by EMC Corporation
WHITE PAPER: Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use.
Posted: 30 Aug 2012 | Published: 04 Jun 2012

EMC Corporation

Transforming Operations Management Through Service Assurance with EMC
sponsored by EMC Corporation
WEBCAST: This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services.
Posted: 30 Aug 2012 | Premiered: Aug 30, 2012

EMC Corporation

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Orchestrating Mainframe and Distributed SCCM and Release Management
sponsored by SERENA Software, Inc.
WHITE PAPER: Read this white paper to find an integrated approach to software change and configuration management. Learn how to effectively balance the need for change v. availability of resources and make rational business decisions without disrupting your audit trail.
Posted: 23 May 2012 | Published: 23 May 2012

SERENA Software, Inc.

AQS, Inc. Major Software Delivery Lifecycle Improvements at AQS, Inc. with StarTeam
sponsored by Micro Focus
CASE STUDY: When software company AQS, Inc. needed to build consistency in their source code management and automate change processes they leveraged a change and configuration management system. Read this case study to learn the benefits they were able to achieve.
Posted: 17 May 2012 | Published: 16 May 2012

Micro Focus

Overcoming virtualization security risks: Best practices
sponsored by Kaspersky
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Kaspersky

Choose an ALM solution that meets your strategic requirements
sponsored by IBM
WHITE PAPER: This buyer's guide describes the key criteria for application lifecycle management (ALM) solutions for today's high-performance teams. It includes key considerations for enhancing your single- or multi-vendor ALM environment.
Posted: 09 Mar 2012 | Published: 31 Dec 2011

IBM

Buying Guide: Virtualization Management Tools
sponsored by TechTarget IT Operations
EGUIDE: Virtualization management has evolved significantly as products mature and IT shops become more savvy. This expert buying guide explores third-party tools in five key areas of virtualization management. Gain insights on what you should consider, whether you're a first-time purchaser or looking to upgrade.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

TechTarget IT Operations

VMware vSphere™ Reference Architecture for Small Medium Business
sponsored by VMware and Dell
WHITE PAPER: Learn about Dell solutions that are optimally configured to run virtualized workloads while providing maximum redundancy, scalability, and manageability. This document covers network architecture, storage configurations, and best practices for configuration and deployment.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

VMware and Dell

Tracking changes to requirements in Agile development
sponsored by IBM
EGUIDE: Agile environments encourage and embrace requirements changes. However, knowing how to effectively manage those changes can be a challenge. This tip guide provides Agile best practices that will ensure requirements are managed effectively through the development cycle.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Effective ALM Planning; How to Appoint a New Management Team
sponsored by IBM
EBOOK: Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with application development goals, explain concepts to management, and improve quality. In this e-book, readers will learn keys to ALM planning and effective ways to introduce ALM to the organization.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Change control councils for successful software releases
sponsored by IBM
EGUIDE: Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with development goals, explain concepts to management, and improve quality throughout the lifecycle. In this e-book, readers will learn best practices for a timely, organized and strong product release.
Posted: 23 Nov 2011 | Published: 07 Nov 2011

IBM

Forecast: Cloudy! Efficient Software Delivery Leveraging Cloud
sponsored by IBM
WEBCAST: This webcast looks at development and test workloads that lend themselves particularly well to leveraging the cloud, such as large scale load testing, and deployment planning and automation, and offers guidance and best practices for organizations interested in cloud-based solutions.
Posted: 11 Nov 2011 | Premiered: Nov 11, 2011

IBM

Agile ALM Q & A
sponsored by Arrow and HP
EGUIDE: From this interview with Michael Hüttermann, readers will learn how software configuration management (SCM) ties in with application lifecycle management (ALM) tools, what exactly constitutes an agile ALM tool, what automation means in an agile ALM context, and finally, tradeoffs between flexibility and configurability.
Posted: 01 Nov 2011 | Published: 31 Dec 2010

Arrow and HP

SAP Implementation and Operation in Integrated Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this detailed technical brief to learn how creating a dynamic infrastructure can advance business performance and reduce operational efforts.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

VMware, Inc.

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.

Best Practices for Preparing for SharePoint Migrations
sponsored by Dell Software
WHITE PAPER: Improve the efficiency and manageability of your SharePoint 2010 migration — while reducing the stress on IT! Learn how in this new white paper by Quest Software.
Posted: 16 Aug 2011 | Published: 09 Aug 2011

Dell Software

Taking Enterprise Application Integration Into The Cloud
sponsored by DellEMC and Intel®
WHITE PAPER: Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service.
Posted: 04 Aug 2011 | Published: 04 Aug 2011

DellEMC and Intel®

Virtual Systems and Server Resource Management Best Practices
sponsored by IBM
EGUIDE: Although virtualization brings a variety of infrastructure improvements, without key resource management, many of the improvements remain unrealized. Take a look at this e-guide from the editors at SearchSystemsChannel.com for expert advice on making the absolute most out of the virtualized environment.
Posted: 22 Jun 2011 | Published: 22 Jun 2011

IBM