ComputerWeekly.com Research Library

Powered by Bitpipe.com

Change Management Research

  • Case Studies with Intel vPro Processor Technology

    Sponsored by: Intel Corporation

    Read this white paper for an analysis of early testing for Intel vPro processor technology in IT departments. See real-world examples of how Intel vPro technology improves security due to the hardware based capabilities not possible with software a...

  • The New CIO: Change Partner and Business Leader

    Sponsored by: IBM

    While all CIOs understand the importance leveraging technology, most of the organizations they serve do not fully use technology to drive growth and innovation. Learn how to become more of a business leader and change partner in your organization.

  • The New Language of Business: SOA and Web 2.0. Download a complimentary chapter

    Sponsored by: IBM

    Sandy Carter, Vice President of SOA and WebSphere Strategy, IBM Corporation, takes readers through a specific roadmap on how, where, when, and why to embrace a Service Oriented Architecture (SOA) strategy in her new book.

  • Sustainable SOX Compliance Made Easy with Tango/04 Multiplatform, Real-time Solutions

    Sponsored by: Tango/04 Computing Group

    Compliance requirements and electronic discovery demands are placing a burden on IT managers. This white paper explores tools and strategies available to help organizations fulfill these requirements.

  • Defining a Governance Model for Portals

    Sponsored by: Infosys Technologies Limited

    Enterprise portals involve governance issues that when ignored can lead to an unsuccessful implementation. Read this paper to learn about a holistic approach to defining and implementing an effective governance model for portals in your organization.

  • ALM in Geographically Distributed Development Environments

    Sponsored by: SERENA Software, Inc.

    A formal Application Lifecycle Management (ALM) and change management infrastructure significantly increases the chances of project success for geographically distributed software development teams. This whitepaper explains why.

  • The New CIO: Change Partner and Business Leader

    Sponsored by: The IBM CIO Interaction Channel

    In this study, find out what 765 global CEOs and 170 CIOs have to say about the importance of closing this "business-technology integration gap."

  • The Shortcut Guide to Network Management for the Mid-Market

    Sponsored by: SolarWinds, Inc.

    This 4-chapter guide was written specifically for network engineers, offering valuable insight into real-world technologies and processes for implementing centralized management and monitoring of your network infrastructure.

  • SOA Solutions Using WebSphere on IBM System p5 Servers

    Sponsored by: IBM Software Group

    This white paper explains how, by deploying SOA on top of a System p platform, you can enable innovation across your company, simplifying the complexity of the IT environment and helping reduce uncertainty around systems security and availa...

  • Longhorn Server and New Group Policy Settings

    Sponsored by: Global Knowledge

    With the advent of Microsoft's "Longhorn" technologies comes a wealth of new and improved Group Policy settings. This paper takes an introductory look at the new categories as well as changes and additions to the existing policy categories.

  • Best Practices for IT Configuration Management

    Sponsored by: Oracle Corporation

    IT Configuration Management, according to Gartner, is associated with discovering and managing the state of an element in an IT infrastructure. In this Webcast a team of experts discuss their perspective on IT configuration management.

  • Tripwire Enterprise Datasheet

    Sponsored by: Tripwire, Inc.

    Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol

  • Control IT With Configuration Audit and Control

    Sponsored by: Tripwire, Inc.

    Learn how establishing a change policy that enforces all changes are auditable and authorized, and all unauthorized changes are investigated, can enable IT organizations to reach compliance, security, and availability goals

  • Ensuring Customer Loyalty: Designing Next-Generation Loyalty Programs

    Sponsored by: Oracle Corporation

    Loyalty programs are a necessary part of a successful CRM program and long-term customer retention. Compare available programs, learn what a loyalty program can achieve for your business and gain an eight step guide to designing your own successful plan.

  • Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals

    Sponsored by: Enterprise Management Associates (EMA)

    Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.

  • Transforming Storage Operations from Entrepreneurial to Predictive

    Sponsored by: EMC Corporation

    Some organizations continue to operate without documented processes, procedures and polices. Learn how to avoid risks to services levels, business continuity - and a new approach to IT - one that moves from a reactive to a more predictive model.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.