ComputerWeekly.com Research Library

Powered by Bitpipe.com

Configuration ManagementResearch

  • Endpoint Security Compliance: Top 19 Questions Auditors Ask

    Sponsored by: Lumension

    This webcast reveals the 19 questions auditors will ask about your endpoints. View now to explore key recommendations on how to maintain compliance so that you will be ready come audit time.

  • Tackling the Application Migration Challenge

    Sponsored by: Dell and Microsoft

    The end is nigh for Windows XP, but a large percentage of PCs worldwide are still running the OS. Companies will have to make the migration to Windows 7 or 8, but for many, application compatibility is causing a huge roadblock. Watch this brief video to find out how to overcome compatibility challenges.

  • Configure or Customize?

    Sponsored by: Workday

    In this paper, we examine the high cost of making and supporting customizations to client/server-based applications as well as the differences between configuration and customization.

  • Agile case studies: How GE, Houghton Mifflin and NYSE drove change

    Sponsored by: TechTarget

    With technological advancements moving at breakneck speeds, it's challenging to keep pace. But in order to stay relevant in the IT landscape you need to move where technology is going. Take a look at this e-guide to discover how to successfully change your existing culture to one of lucidity and conjunction – and set business processes accordingly.

  • ERP Projects: Tips and Best Practices for a Successful Implementation

    Sponsored by: IFS

    This expert e-guide from SearchManufacturingERP.com counts down eight steps for creating executive support for ERP projects and ensuring a successful ERP implementation. Also inside, learn how to minimize ERP customizations.

  • Gain Faster Value from Your CMS

    Sponsored by: Hewlett-Packard Company

    This white paper highlights the true value of deploying a configuration management system (CMS).

  • Eight Ways Better Software Deployment and Management Can Save You Money

    Sponsored by: Dell, Inc.

    This resource counts down eight critical benefits you can achieve by learning to effectively manage the software deployment lifecycle. Also inside, find key recommendations to help you get started.

  • Targeted Attack Detection and Remediation Security School

    Sponsored by: SearchSecurity.com

    In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.

  • Weaponized Malware - A Clear and Present Danger

    Sponsored by: Lumension

    Weaponized malware and advanced persistent threats raise the bar on endpoint security. Originally intended for cyber-espionage and cyber-warfare, these sophisticated attacks are now available to any cyber-criminal. How can security pros protect their organizations from these emerging perils?

  • La Jolla Institute for Allergy & Immunology: Customer Video

    Sponsored by: Absolute Software

    In this on-demand video case study, learn how the right enterprise-level management software allowed La Jolla Institute for Allergy & Immunology to better manage, secure, and track all of its systems and devices.

  • Microsoft Exchange 2010 on Dell Systems: Small and Branch Office Configurations

    Sponsored by: Dell and Microsoft

    This whitepaper demonstrates the Dell Systems configuration models that are available for small and branch office configurations with Microsoft Exchange 2010. These solutions are especially designed for businesses of up to 1,000 mailboxes.

  • Data Sheet: What's New in Red Hat Satellite 5.6?

    Sponsored by: Red Hat

    Discover the new Red Hat Satellite 5.6 capabilities and features that provide administrators with the means to efficiently manage their systems, lowering per-system deployment and management costs.

  • Don't Be a Hostage to Your ERP System

    Sponsored by: CSC

    ERP systems are essential to the functioning of your business, but when it comes to customizing ERP systems to fit changing needs, it can be a lengthy, costly, risky process. Wouldn't it be great if you could get the process agility you need from your ERP system, without the complexity or the high price tag? Access this resource to find out how.

  • A Step Change in Development Efficiency

    Sponsored by: MicroFocus

    This whitepaper helps you improve the efficiency and effectiveness of the mainframe development processes via simple-to-use, centrally-configurable graphical modeling.

  • The Cost of One Wrong Database Change: Can You Afford It?

    Sponsored by: Datical

    Did you know there's a 78% chance that a database change or schema update will break an application or result in a loss of critical data? Check out this resource to see why database change management is a top priority for IT departments, and learn how a schema management technology can help accelerate app releases and eliminate downtime.

  • FAQ: Minimize SAP Testing Efforts

    Sponsored by: IBM

    Trying to balance quality, speed and performance expectations is difficult enough, but when the pressure to deliver changes faster mounts, traditional QA and testing methods just don't cut it.Luckily, this resource is here to help - with answers to FAQs about how to minimize testing efforts in your SAP landscape.

  • Has DevOps Missed the Boat?

    Sponsored by: Datical

    As applications become more complex, and faster releases are expected, the chance that errors will occur is high - especially during database updates. In this resource, discover a software that simplifies database deployment and configuration for business-critical apps, as well as forecasts the impact of database changes before they're made.

  • Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler

    Sponsored by: Citrix

    Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.

  • 10 Obvious Statements about Software Configuration and Change Management (And What They Mean For Your Organization)

    Sponsored by: Remain Software

    This document will explore 10 important aspects that should be considered before proceeding with the implementation of a specific solution.

  • Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations

    Sponsored by: Dell and Microsoft

    This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.

  • Mobile Configuration Management Functions for Successful MDM

    Sponsored by: Citrix Systems, Inc.

    This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.

  • MDM Software: Benefits of Mobile Configuration Management

    Sponsored by: Fiberlink

    This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.

  • Dell 2-2-1 Solutions: High-Availability Virtualization with Dell PowerEdge R410 Servers

    Sponsored by: Dell and Microsoft

    This configuration guide walks you through the critical activities that take place during a virtualization deployment and describes a recommended reference architecture that can help you achieve your desired results. Learn more about the key features of this technology and how to properly enable them in this essential resource.

  • Research Summary: Network Management Megatrends 2012

    Sponsored by: EMC Corporation

    Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use.

  • Transforming Operations Management Through Service Assurance with EMC

    Sponsored by: EMC Corporation

    This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.