Configuration Management

Configuration Management: The management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures and test documentation of an automated information system, throughout the development and operational life of a system. The control of changes, including the recording thereof, that are made to the hardware, software, firmware, and documentation throughout the system lifecycle.
Results 126 - 150 of 236Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Oct 07, 2011
Need for Speed and Flexibility Drives Manufacturers to Reengineer External Processes Around B2B Integration.
Tags : external process, idc, technology, ibm, b2b integration, application integration, application performance management, best practices, business analytics, business intelligence, configuration management
     IBM
By: CyrusOne     Published Date: Sep 23, 2011
This executive report reviews 6 key factors that affect the data center "build or buy" choice, including those which extend beyond basic TCO analysis.
Tags : cyrus one, cyrusone, white paper, executive report, datacenter, data center, build, colocation, tco, infrastructure, network management, business intelligence, configuration management, productivity, project management
     CyrusOne
By: Texas Memory Systems     Published Date: Aug 18, 2011
Companies who have implemented solid state disks make better use of server infrastructure, support concurrent user loads and improve user satisfaction
Tags : texas memory systems, tms, storage, speed, infrastructure, load, sql solutions, flash, ram, design, yssytems, oracle, flash, ram, oracle solutions, sql, network architecture, network management, network performance, network performance management
     Texas Memory Systems
By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
     Quest Software
By: CA Service Assurance     Published Date: May 08, 2011
While the rise of web-enabled applications and the zero latency customers expect from them has driven many enterprises to adopt performance management solutions, they are finding that basic understanding of how their overall user populations are being served is simply not enough.
Tags : application experience, application delivery, customer app experience, user satisfaction, application performance management, business activity monitoring, customer satisfaction, enterprise software, performance testing, quality assurance, configuration management, service management
     CA Service Assurance
By: SAP     Published Date: Mar 24, 2011
As you prepare to embark on an ERP implementation or to upgrade an existing system, you have a lot to juggle and plan. You know the horror stories of "go-lives" going bad but you aren't sure how to avoid the pitfalls. This white paper discusses at length how Utopia's formal data migration methodology reduces the risks of large systems deployments by using a tried-and-tested framework for the entire migration process, from source data analysis through post-go-live support.
Tags : data migration management, source data analysis, data integrity, erp implementation, enterprise resource planning, business intelligence, configuration management, database development, data integration, data protection, data quality, data replication, web service management, data warehousing
     SAP
By: Oracle Corporation     Published Date: Mar 03, 2011
This white paper discusses how by designing these three corner stones correctly, you can seamlessly scale out your EDW without having to constantly tune or tweak the system.
Tags : datawarehousing, system management, oracle, business intelligence, configuration management
     Oracle Corporation
By: DataFlux     Published Date: Jan 07, 2011
This white paper introduces and examines a breakthrough platform solution designed to drive parallel-process data integration - without intensive pre-configuration - and support full-lifecycle data management from discovery to retirement.
Tags : dataflux, enterprise data, data integration, configuration, lifecycle data management, data warehouses, enterprise software, product lifecycle management, application integration, configuration management, data quality, data warehousing
     DataFlux
By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning, configuration management, infrastructure, network security, compliance, patch management, business process automation, data protection
     Shavlik Technologies
By: Shavlik Technologies     Published Date: Dec 14, 2010
This report provides insights into Best-in-Class practices for assessing vulnerabilities and threats to IT infrastructure, prioritizing fixes based on the business value of resources and acceptable levels of risk, and remediating through the efficient deployment of patches, configuration changes, and other compensating controls.
Tags : shavlik security, vulnerability management lifecycle, it infrastructure, risk, deployment, configuration, monitoring and measurement, monitoring, test and measurement, internet security, security management, risk management, configuration management, vulnerability management
     Shavlik Technologies
By: rPath     Published Date: Dec 10, 2010
This white paper introduces rPath intelligent system automation as a way to bring consistency, control and scale to .NET production environments. In particular, it describes three scenarios for using rPath within .NET environments.
Tags : rpath, automation, sccm, application integration, business process automation, system management software, configuration management
     rPath
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management, anti spam, anti spyware, application security, windows server, data protection
     Lumension
By: Microsoft Corporation     Published Date: Oct 19, 2010
Interested in the getting a close look at Microsoft® Online Services in action? If so, please join us for the Microsoft-led webinar, Microsoft Online Services.
Tags : microsoft online services, end-user experiences, administration, migration, configuration, sharepoint, windows, configuration management
     Microsoft Corporation
By: Tripwire     Published Date: Oct 14, 2010
Now smart CISOs are looking to lockdown the enterprise to achieve continuous compliance and narrow the breach-to-detection gap with baseline controls in configuration and change management.
Tags : tripwire, breach, detection, security, configuration and change management, compliance, intrusion detection, intrusion prevention, security management, configuration management
     Tripwire
By: ScriptLogic     Published Date: Oct 12, 2010
According to Gartner Research and IBM, software applications traditionally require maintenance agreements costing 10 to 30% of the license cost per year. Understanding these costs, and having the tools to manage them is the basis of Software Asset Management. ScriptLogic Asset Manager is a complete and cost-saving software asset management solution for effectively managing total software costs and utilization.
Tags : scriptlogic, software asset management, software license, tracking, automation, system center configuration manager, sccm, virtual application, business process automation, server virtualization, system management software, scripting, configuration management
     ScriptLogic
By: Vertica     Published Date: Aug 16, 2010
The Vertica Analytic Database is the only database built from scratch to handle today's heavy business intelligence workloads. In customer benchmarks, Vertica has been shown to manage terabytes of data running on extraordinarily low-cost hardware and answers queries 50 to 200 times faster than competing row-oriented databases and specialized analytic hardware. This document summarizes the key aspects of Vertica's technology that enable such dramatic performance benefits, and compares the design of Vertica to other popular relational systems.
Tags : vertica, ec2, elastic, cloud computing, workflow, benchmark, projections, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, business analytics, business metrics, marketing automation, linux, application integration
     Vertica
By: Vertica     Published Date: Aug 15, 2010
If you are responsible for BI (Business Intelligence) in your organization, there are three questions you should ask yourself: - Are there applications in my organization for combining operational processes with analytical insight that we can't deploy because of performance and capacity constraints with our existing BI environment?
Tags : business intelligence, vertica, aggregated data, olap, rolap, sql, query, data warehouse, oltp, business analytics, business metrics, marketing automation, linux, application integration, analytical applications, configuration management, database development, data integration, data mining, data quality
     Vertica
By: Citrix Online     Published Date: Aug 09, 2010
This series takes you through the many issues that plague the modern help desk, and states the case for implementing user-centric remote support.
Tags : citrix, gotoassist, remote support, help desk, configuration, service delivery, return on investment, roi, mobile worker, performance measure, remote access, remote network management, test and measurement, mobile computing, mobile data systems, mobile workers, configuration management, service management
     Citrix Online
By: IBM Software     Published Date: Aug 04, 2010
The path to creating a secure application begins by rigorously testing source code for all vulnerabilities and ensuring that use of the application does not compromise or allow others to compromise data privacy and integrity.
Tags : ibm ouncelab, secure application, testing source code, data privacy, security, application configuration, encoding error, encryption, security management, software outsourcing, configuration management, database security, vulnerability management
     IBM Software
By: Red Hat     Published Date: Jul 14, 2010
This paper demonstrates the steps to deploy and configure a LAMP infrastructure and application with Red Hat Enterprise Linux.
Tags : red hat, enterprise linux, lamp, deployment, configuration, application integration, apache, mysql, php, enterprise software, linux, configuration management
     Red Hat
By: Siemon Company     Published Date: May 12, 2010
Siemon, a global leader in network cabling solutions and data center physical layer infrastructure, offers this new 66-page E-Book focused on guiding data center professionals and service providers through key infrastructure challenges.
Tags : siemon, ieee, cooling, data center, cabling, cooling, networking, physical infrastructure, saas, paas, infrastructure, internetworking hardware, local area networking, network performance management, network provisioning, server hardware, small business networks, business intelligence, configuration management, database development
     Siemon Company
By: Pillar Data Systems     Published Date: Apr 20, 2010
The most critical component of an Exchange deployment is the storage subsystem where the data is held. Download this white paper to learn best practices in storage sizing and deployment.
Tags : pillar data systems, microsoft exchange best practices, storage size, exchange deployment, virtualization, storage configuration, data priority, storage virtualization, best practices, server virtualization, microsoft exchange, configuration management
     Pillar Data Systems
By: Vertica     Published Date: Mar 15, 2010
Revenue assurance analysts at a top-tier US-based carrier studied this every day. Primarily focused on detecting fraud, revenue sharing contract violations and incomplete revenue collections, they had the need to query and analyze call detail record (CDR) databases that grow by millions of new CDRs every day.
Tags : vertica, ec2, cdr, elastic, saas, dbms, sql, acid transactions, jdbc, odbc, etl, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms
     Vertica
By: Vertica     Published Date: Mar 15, 2010
In a world of growing data volumes and shrinking IT budgets, it is critical to think differently about the efficiency of your database and storage infrastructure. The Vertica Analytic Database is a high-performance, scalable and cost-effective solution that can bring dramatic savings in hardware, storage and operational costs.
Tags : vertica, ec2, cdr, elastic, saas, cdr, cloud computing, data management, ad-hoc, business intelligence, cloud, cloudbased applications, analytic, saas, dbms, mpp, storage management, business analytics, business metrics, marketing automation
     Vertica
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.