IT Management  >   Systems Operations  >  

Configuration Management

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: A configuration management database (CMDB) is a database that contains all relevant information about the components of the information system used in an organization's IT services and the relationships between those components. A CMDB provides an organized view of data and a means of examining that data from any desired perspective. Within this context, components of an information system are referred  … 
Definition continues below.
Configuration ManagementReports
26 - 50 of 200 Matches Previous Page  | Next Page
CW Buyer's Guide: IT Tools
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This Computer Weekly buyer’s guide to IT tools shows how you can use software and systems to improve the running of your IT department.
Posted: 08 May 2012 | Published: 08 May 2012

ComputerWeekly.com

Research Summary: Network Management Megatrends 2012
sponsored by EMC Corporation
WHITE PAPER: Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use.
Posted: 30 Aug 2012 | Published: 04 Jun 2012

EMC Corporation

Transforming Operations Management Through Service Assurance with EMC
sponsored by EMC Corporation
WEBCAST: This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services.
Posted: 30 Aug 2012 | Premiered: Aug 30, 2012

EMC Corporation

Contextual Authentication: A Multi-factor Approach
sponsored by PortalGuard
WHITE PAPER: This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.
Posted: 17 Aug 2012 | Published: 17 Aug 2012

PortalGuard

Make Group Policies Do More and Reach Further
sponsored by Dell Software
WHITE PAPER: This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.
Posted: 25 Jun 2012 | Published: 20 Jun 2012

Dell Software

Taking Enterprise Application Integration into the Cloud
sponsored by Dell, Inc.
WHITE PAPER: Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Dell, Inc.

SearchSoftwareQuality.com E-Guide: Best Practices for Testing and QA
sponsored by SAP America, Inc.
EGUIDE: This expert e-guide teaches QA managers ten things to know for successful configuration testing and provides guidance for overcoming five common hurdles of dealing with QA-reluctant CIOs.
Posted: 30 May 2012 | Published: 25 May 2012

SAP America, Inc.

Orchestrating Mainframe and Distributed SCCM and Release Management
sponsored by SERENA Software, Inc.
WHITE PAPER: Read this white paper to find an integrated approach to software change and configuration management. Learn how to effectively balance the need for change v. availability of resources and make rational business decisions without disrupting your audit trail.
Posted: 23 May 2012 | Published: 23 May 2012

SERENA Software, Inc.

Exploring cloud Security as a Service options
sponsored by HP Enterprise Security
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

HP Enterprise Security

AQS, Inc. Major Software Delivery Lifecycle Improvements at AQS, Inc. with StarTeam
sponsored by Micro Focus
CASE STUDY: When software company AQS, Inc. needed to build consistency in their source code management and automate change processes they leveraged a change and configuration management system. Read this case study to learn the benefits they were able to achieve.
Posted: 17 May 2012 | Published: 16 May 2012

Micro Focus

Overcoming virtualization security risks: Best practices
sponsored by Kaspersky Lab
EGUIDE: Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

Kaspersky Lab

Choose an ALM solution that meets your strategic requirements
sponsored by IBM
WHITE PAPER: This buyer's guide describes the key criteria for application lifecycle management (ALM) solutions for today's high-performance teams. It includes key considerations for enhancing your single- or multi-vendor ALM environment.
Posted: 09 Mar 2012 | Published: 31 Dec 2011

IBM

ALM and Agile Strategies E-Zine Issue 1
sponsored by CA Technologies.
EZINE: Using modern-day Agile techniques such as automation and cloud hosting solutions, today’s IT leaders have opportunities to reap better returns on their ALM investments. In this issue, experts will share source code control system automation strategies, hosting options for code repositories and trends in requirements management tools.
Posted: 24 Feb 2012 | Published: 17 Feb 2012

CA Technologies.

Buying Guide: Virtualization Management Tools
sponsored by SearchServerVirtualization
EGUIDE: Virtualization management has evolved significantly as products mature and IT shops become more savvy. This expert buying guide explores third-party tools in five key areas of virtualization management. Gain insights on what you should consider, whether you're a first-time purchaser or looking to upgrade.
Posted: 10 Jan 2012 | Published: 10 Jan 2012

SearchServerVirtualization

A Guide to Branching and Merging Patterns
sponsored by AccuRev
WHITE PAPER: In this paper, gain a better understanding of how branching and merging patterns work and how applying them to your projects can have a profound effect on how your development team handles change management and delivers software.
Posted: 06 Jan 2012 | Published: 05 Jan 2012

AccuRev

Three simple steps to better patch security
sponsored by Sophos, Inc.
WHITE PAPER: Security experts estimate that 90% of successful attacks against software vulnerabilities could be prevented with an existing patch or configuration setting. Still, many computers in organizations remain unpatched and unprotected. In this whitepaper, uncover three best practices for improving your security and compliance with patch assessment.
Posted: 01 Jan 2012 | Published: 16 Dec 2011

Sophos, Inc.

The top 10 misconceptions about performance and availability monitoring
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines the 10 common misunderstandings about monitoring of today's complex, distributed, and service-oriented applications and offers suggestions for implementing complete business-focused, adaptable monitoring strategies.
Posted: 21 Dec 2011 | Published: 14 Dec 2011

Hewlett-Packard Company

VMware vSphere™ Reference Architecture for Small Medium Business
sponsored by VMware and Dell
WHITE PAPER: Learn about Dell solutions that are optimally configured to run virtualized workloads while providing maximum redundancy, scalability, and manageability. This document covers network architecture, storage configurations, and best practices for configuration and deployment.
Posted: 12 Dec 2011 | Published: 12 Dec 2011

VMware and Dell

Tracking changes to requirements in Agile development
sponsored by IBM
EGUIDE: Agile environments encourage and embrace requirements changes. However, knowing how to effectively manage those changes can be a challenge. This tip guide provides Agile best practices that will ensure requirements are managed effectively through the development cycle.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Effective ALM Planning; How to Appoint a New Management Team
sponsored by IBM
EBOOK: Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with application development goals, explain concepts to management, and improve quality. In this e-book, readers will learn keys to ALM planning and effective ways to introduce ALM to the organization.
Posted: 28 Nov 2011 | Published: 07 Nov 2011

IBM

Change control councils for successful software releases
sponsored by IBM
EGUIDE: Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with development goals, explain concepts to management, and improve quality throughout the lifecycle. In this e-book, readers will learn best practices for a timely, organized and strong product release.
Posted: 23 Nov 2011 | Published: 07 Nov 2011

IBM

Forecast: Cloudy! Efficient Software Delivery Leveraging Cloud
sponsored by IBM
WEBCAST: This webcast looks at development and test workloads that lend themselves particularly well to leveraging the cloud, such as large scale load testing, and deployment planning and automation, and offers guidance and best practices for organizations interested in cloud-based solutions.
Posted: 11 Nov 2011 | Premiered: Nov 11, 2011

IBM

White Paper: SCM: The "Blocking and Tackling" of IT Security
sponsored by Tripwire, Inc.
WHITE PAPER: In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they’re an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects and corrects any subsequent changes that weaken them.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Tripwire, Inc.

Agile ALM Q & A
sponsored by Arrow and HP
EGUIDE: From this interview with Michael Hüttermann, readers will learn how software configuration management (SCM) ties in with application lifecycle management (ALM) tools, what exactly constitutes an agile ALM tool, what automation means in an agile ALM context, and finally, tradeoffs between flexibility and configurability.
Posted: 01 Nov 2011 | Published: 31 Dec 2010

Arrow and HP

SAP Implementation and Operation in Integrated Environments
sponsored by VMware, Inc.
WHITE PAPER: Access this detailed technical brief to learn how creating a dynamic infrastructure can advance business performance and reduce operational efforts.
Posted: 31 Oct 2011 | Published: 31 Oct 2011

VMware, Inc.
26 - 50 of 200 Matches Previous Page    1 2 3 4 5    Next Page
 
CONFIGURATION MANAGEMENT DEFINITION (continued): …  to as configuration items (CI). A CI can be any conceivable IT component, including software, hardware, documentation, and personnel, as well as any combination of them. The processes of configuration management seek to specify, control, and track configuration items and any changes made to them in a comprehensive and systematic fashion. The IT Infrastructure Library (ITIL) best practices standards include specifications for configuration management. According to ITIL specifications, the four major tasks of configuration management are: Identification of configuration items to be included in … 
Configuration Management definition sponsored by SearchDataCenter.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement