configuration management

Results 126 - 150 of 173Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Jun 15, 2009
ASG's Business Service Portfolio (BSP) Virtualization Management provides comprehensive oversight, inspections, discoveries, warnings, diagnostics, and reporting for the critical technology and administrative disciplines involved in virtual workload management. This is all done in parallel with physical systems management.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap, ilm, mobius, workload automation, wla, visibility, configuration management, metadata, metacmdb, lob, sdm, service dependency mapping, ecommerce
    
ASG Software Solutions
Published By: HP     Published Date: Aug 25, 2014
For business organizations who desire to take advantage of the benefits of cloud computing but are limited in the time, expertise and available resources to adapt to a cloud methodology, HP offers the HP ConvergedSystem series of solutions. The HP ConvergedSystem is a complete turnkey solution containing the necessary hardware and software components in a factory-assembled pre-racked and cabled configuration, especially designed to establish a total on premise virtualized environment ideal for supporting today’s most popular business applications. This document addresses the considerations for deploying Microsoft SharePoint 2013, with an emphasis on virtualization, on an HP ConvergedSystem 300 solution; supporting an SMB-sized population running a broadly applicable collaboration and document management workload, and requirement for HA.
Tags : 
converged system, server, complexity, storage, networking, virtualization, data center, cloud, infrastructure, integrated, optimization, solution, standardizing, hardware, sharepoint, configuration
    
HP
Published By: HP     Published Date: Aug 26, 2014
Get safe, secure always-on access to email, calendar, and contacts almost anywhere, from almost any device. HP Flex-Bundles for Microsoft® Exchange Server 2013 are Microsoft Exchange ready, affordable business email packages that combine the world’s most intelligent servers—HP ProLiant Gen8 servers—with high-performance Intel® processors, HP software, and Microsoft Windows® operating system software to get you started—and keep you moving—on your IT infrastructure journey. HP ServeIT Flex-Bundles, built upon the HP ProLiant ML350p Gen8 server and Microsoft® Exchange Server 2013, provide pre-defined configurations that can improve your productivity by enhancing accessibility to email, calendars, and contacts while simplifying IT management. Learn more.
Tags : 
productivity, secure, safe, servers, processor, email, calendar, solution, improve, exchange, accessibility, management, system, contacts, device, performance, infrastructure, wireless, data management
    
HP
Published By: Backupify     Published Date: Jul 15, 2013
The benefits of moving to the cloud are numerous. Someone else now handles server and application setup, configuration, and system management, reducing personnel costs and increasing convenience and access for your employees. Microsoft Office 365 and Google Apps for Business are both comprehensive office productivity and communication tools for businesses looking to move to the cloud. But the two solutions have significant differences. This resource provides a breakdown of the differences and demonstrates each solution’s strengths to help guide decision-makers based on their company’s priorities and needs.
Tags : 
office 365, google apps, cloud
    
Backupify
Published By: IBM     Published Date: Feb 18, 2015
UrbanCode Deploy provides extensive capabilities for configuring WebSphere Application Server (WAS) through plug-ins: Application Deployment for WebSphere - which enables the auto-discovery of WAS cells; and Middleware Configuration for WebSphere - which allows for management of WAS configurations. When combined, UrbanCode Deploy and these plug-ins enable a rapid, controlled method for continuous delivery to WebSphere Application Servers.
Tags : 
application delivery, websphere, ibm, urbancode, application server, it management, knowledge management, enterprise applications
    
IBM
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, endpoint security, portable computer, end user
    
Absolute Software
Published By: Alacritech     Published Date: Aug 21, 2009
As IT costs grow, budgets shrink, and demand soars, there is an immediate need to extend and/or consolidate existing server assets. Many IT departments are currently faced with reduced capital budgets as well as decreased staffing levels for NAS Systems.
Tags : 
configuration, windows, change management, it spending, alacritech
    
Alacritech
Published By: DataSynapse     Published Date: Feb 26, 2007
High availability (HA) configurations seek to bring downtime to zero - but can increase complexity across the IT organization, often in the form of excess technology, financial, and human capital investments.  Learn how application virtualization can reduce planned and unplanned downtime, and deliver greater flexibility.
Tags : 
high availability, it management, productivity, total cost of ownership, return on investment, configuration management, flexibility, data synapse, datasynapse
    
DataSynapse
Published By: IBM     Published Date: Mar 17, 2009
Download this webcast replay to learn more about: Integrating Software Development and System Engineering, Integrated Requirements Engineering, Cross-Discipline Change and Configuration Management
Tags : 
ibm, telelogic, automotive system designs, mechatronics, electronic and software engineering, ptc, ibm rational, integrated requirements engineering, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
This Webcast is brought to you by Manufacturing Business Technology, PTC, IBM. It addresses what Companies recognize as the market trends that are driving the need for Product Lifecycle Management (PLM), and how PLM is delivered with alternative business scenarios. Key speakers are Jim Brown, President and analyst of Tech-Clarity Inc, Tom Shoemaker, VP of Solutions Marketing for PTC, and Naseem Rao, Global Solutions Executive for IBM.
Tags : 
ibm, telelogic, core business values, business continuity, change and configuration management, best practices, plm, market trends, security, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 17, 2009
With A&D products containing tens of thousands of parts, and potentially millions of lines of software code–produced by hundreds of companies dispersed across the globe, Aerospace & Defense organizations understand the fundamental value and dire need for robust Change & Configuration Management (CM) processes. But it’s not just the number of parts, lines of code, or partners driving the need for better processes. The complexity of products and development processes, as well as the globalization of product development, are all contributing to an environment that is becoming more difficult to manage with each new program or project.
Tags : 
change and configuration management, ibm, telelogic, a&d, software coding, aerospace and defense, global supply chain, product data management, pdm, boms, cad, managing integrated product data, windchill pdmlink, cmmi
    
IBM
Published By: IBM     Published Date: Apr 17, 2009
Optimize IT process, maximize ROI and improve service levels. The challenge facing businesses today is the need to achieve ever-higher levels of service and maximize return on investment, while simultaneously minimizing costs. This white paper reveals how IBM Maximo® asset and service management solutions help your organization run more efficiently.
Tags : 
ibm maximo, asset and service management solution, optimize it, maximize roi, service lebels, service management solutions, tivoli, it business processes, service levels, ibm, service level agreements slas, key perfor¬mance indicators, kpis, it asset management, itam, it infrastructure library, itil, it asset management, itam, work management
    
IBM
Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency, secure computing, securecomputing
    
Secure Computing
Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Learn how Secure Configuration Manager can help with compliance requirements in the IT controls areas of entitlement reporting & segregation of duties. Discover how to make your compliance program more sustainable & repeatable, while gaining visibility into sources of vulnerability & risk exposure.
Tags : 
compliance, netiq, net iq, policy management, configuration management, unix, risk management, change management, hipaa, hipaa compliance, vulnerability, vulnerabilities
    
NetIQ Corporation
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Understand why FISMA is heating up, what's the impact on Agency IT departments, what role configuration reporting plays, how the right documentation can build a strong audit trail, and how automation fast tracks your compliance plan.
Tags : 
change management, configuration management, it management, fisma, fisma compliant, fisma compliance, project management, compliance, compliant, regulatory compliance, audit, auditing, cmdb, gisra, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn the importance of change management in today's complex IT infrastructures.
Tags : 
change management, configuration management, it management, project management, compliance, compliant, audit, auditing, patch, patch management, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
This paper offers the industry's only solution for automating detailed reporting that ensures Enterprise Configuration Visibility™ – reducing the time and cost associated with IT control, compliance, and security, and ensuring the highest levels of availability and performance for your organization.
Tags : 
configuration management, compliance, security management, audit, auditing, regulatory compliance, monitoring, itil, change management, ecora, enterprise applications
    
Ecora Software
Published By: Tideway Systems     Published Date: Dec 11, 2007
Many firms are embarking on ambitious data center optimization projects to significantly reduce cost in hardware, maintenance, licensing, rack space, cooling and power – only to realize they are lacking fundamental data about their environment. Learn how you can accelerate and de-risk your data center optimization initiatives.
Tags : 
infrastructure, network management, configuration management, cms, cmml, cmdb, datacenter, data center, datacenters, tideway, tideway systems
    
Tideway Systems
Published By: Tideway Systems     Published Date: Dec 11, 2007
IT service providers need to offer services that deliver new business opportunities whilst increasing levels of availability, controlling risks and reducing costs. This paper provides you with practical guidance based on the practices in ITIL® V3 that will help you manage application and infrastructure changes and configurations.
Tags : 
service management, itil, change management, configuration management, knowledge management, service strategy, service design, tideway, tideway systems
    
Tideway Systems
Published By: Intellitactics     Published Date: Feb 28, 2008
Save time and money by sustaining compliance between audits. Aberdeen Group's Derek Brink describes the benefits that best in class companies achieve by taking steps to sustain compliance.
Tags : 
compliance, log management, security information management, sim, security event management, sem, siem, network behavior analysis, automated vulnerability management, avm, patch management, configuration management, network access control, nac, pci, pci dss, hipaa, ffiec, cobit, iso 17799
    
Intellitactics
Published By: Clarus Systems     Published Date: Mar 18, 2008
The recent momentum of Unified Communications (UC) and the disruptive enabling technology of IP Telephony have created a convergence between Voice Engineering and IT departments that is unprecedented - even since the advent of computer telephony integration. However, despite rapid and significant advances within these technologies, many enterprises, even the early adopters, have not fully embraced the alignment of these two worlds.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept