ComputerWeekly.com Research Library

Powered by Bitpipe.com

Configuration Management Research

  • MDM Software: Benefits of Mobile Configuration Management

    Sponsored by: TechTarget Security

    This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.

  • E-Guide: Configure Outbound Firewall Rules for Data Protection

    Sponsored by: TechTarget Security

    A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.

  • Exploring cloud Security as a Service options

    Sponsored by: TechTarget Security

    There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.

  • Mobile Configuration Management Functions for Successful MDM

    Sponsored by: Citrix Systems, Inc.

    This expert E-Guide will help you get the most out of mobile configuration management. Read on to understand more about security certificates, local file encryption, proxies and more.

  • Dell 2-2-1 Solutions: High-Availability Virtualization with Dell PowerEdge R410 Servers

    Sponsored by: Dell EMC and Microsoft

    This configuration guide walks you through the critical activities that take place during a virtualization deployment and describes a recommended reference architecture that can help you achieve your desired results. Learn more about the key features of this technology and how to properly enable them in this essential resource.

  • Research Summary: Network Management Megatrends 2012

    Sponsored by: EMC Corporation

    Uncover details of three of the top network management megatrends of 2012, the effect they can have on your network, and why network managers are re-assessing the tools, technologies, and practices they currently use.

  • Transforming Operations Management Through Service Assurance with EMC

    Sponsored by: EMC Corporation

    This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services.

  • Contextual Authentication: A Multi-factor Approach

    Sponsored by: PortalGuard

    This informative white paper offers a few solutions for remaining efficient without sacrificing security. It provides an explanation on the midpoint between better password policies and two-factor authentication processes. Your data deserves the utmost protection, access this white paper now so you can ensure security.

  • Make Group Policies Do More and Reach Further

    Sponsored by: Dell Software

    This white paper introduces the latest desktop management platform that can help expand the benefits of Group Policy and overcome its various deficiencies. Explore the advantages it can provide and review the advanced features it offers.

  • Orchestrating Mainframe and Distributed SCCM and Release Management

    Sponsored by: SERENA Software, Inc.

    Read this white paper to find an integrated approach to software change and configuration management. Learn how to effectively balance the need for change v. availability of resources and make rational business decisions without disrupting your audit trail.

  • AQS, Inc. Major Software Delivery Lifecycle Improvements at AQS, Inc. with StarTeam

    Sponsored by: Micro Focus

    When software company AQS, Inc. needed to build consistency in their source code management and automate change processes they leveraged a change and configuration management system. Read this case study to learn the benefits they were able to achieve.

  • Overcoming virtualization security risks: Best practices

    Sponsored by: Kaspersky

    Read this expert e-guide to learn best practices for securing your virtualized environment. Gain insights on how to overcome common challenges and minimize potential risks.

  • Choose an ALM solution that meets your strategic requirements

    Sponsored by: IBM

    This buyer's guide describes the key criteria for application lifecycle management (ALM) solutions for today's high-performance teams. It includes key considerations for enhancing your single- or multi-vendor ALM environment.

  • Buying Guide: Virtualization Management Tools

    Sponsored by: TechTarget IT Operations

    Virtualization management has evolved significantly as products mature and IT shops become more savvy. This expert buying guide explores third-party tools in five key areas of virtualization management. Gain insights on what you should consider, whether you're a first-time purchaser or looking to upgrade.

  • VMware vSphere™ Reference Architecture for Small Medium Business

    Sponsored by: VMware and Dell

    Learn about Dell solutions that are optimally configured to run virtualized workloads while providing maximum redundancy, scalability, and manageability. This document covers network architecture, storage configurations, and best practices for configuration and deployment.

  • Tracking changes to requirements in Agile development

    Sponsored by: IBM

    Agile environments encourage and embrace requirements changes. However, knowing how to effectively manage those changes can be a challenge. This tip guide provides Agile best practices that will ensure requirements are managed effectively through the development cycle.

  • Effective ALM Planning; How to Appoint a New Management Team

    Sponsored by: IBM

    Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with application development goals, explain concepts to management, and improve quality. In this e-book, readers will learn keys to ALM planning and effective ways to introduce ALM to the organization.

  • Change control councils for successful software releases

    Sponsored by: IBM

    Proper application lifecycle management (ALM) planning and the appointment of a change and configuration team can help align business goals with development goals, explain concepts to management, and improve quality throughout the lifecycle. In this e-book, readers will learn best practices for a timely, organized and strong product release.

  • Forecast: Cloudy! Efficient Software Delivery Leveraging Cloud

    Sponsored by: IBM

    This webcast looks at development and test workloads that lend themselves particularly well to leveraging the cloud, such as large scale load testing, and deployment planning and automation, and offers guidance and best practices for organizations interested in cloud-based solutions.

  • Agile ALM Q & A

    Sponsored by: Arrow and HP

    From this interview with Michael Hüttermann, readers will learn how software configuration management (SCM) ties in with application lifecycle management (ALM) tools, what exactly constitutes an agile ALM tool, what automation means in an agile ALM context, and finally, tradeoffs between flexibility and configurability.

  • SAP Implementation and Operation in Integrated Environments

    Sponsored by: VMware, Inc.

    Access this detailed technical brief to learn how creating a dynamic infrastructure can advance business performance and reduce operational efforts.

  • E-Guide: Exploring Configuration Changes to Reduce Attacks

    Sponsored by: Tripwire, Inc.

    Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.

  • Best Practices for Preparing for SharePoint Migrations

    Sponsored by: Dell Software

    Improve the efficiency and manageability of your SharePoint 2010 migration — while reducing the stress on IT! Learn how in this new white paper by Quest Software.

  • Taking Enterprise Application Integration Into The Cloud

    Sponsored by: DellEMC and Intel®

    Of all the advancements to enterprise computing, the cloud is the latest, coming with an assortment of promises to totally reshape your organization's computing approach. Access this brief and exclusive resource for an overview of cloud computing, specifically software-as-a-service.

  • Virtual Systems and Server Resource Management Best Practices

    Sponsored by: IBM

    Although virtualization brings a variety of infrastructure improvements, without key resource management, many of the improvements remain unrealized. Take a look at this e-guide from the editors at SearchSystemsChannel.com for expert advice on making the absolute most out of the virtualized environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.