Configuration Management White Papers

Configuration Management: The management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures and test documentation of an automated information system, throughout the development and operational life of a system. The control of changes, including the recording thereof, that are made to the hardware, software, firmware, and documentation throughout the system lifecycle.
Results 1 - 25 of 226Sort Results By: Published Date | Title | Company Name
By: 123Together     Published Date: Feb 05, 2009

Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity

Tags : 123together, it strategies, ediscovery, finra, regulation, security, finra, contact management
    
By: IBM     Published Date: Aug 28, 2014

Data volumes are getting out of control, but choosing the right information lifecycle governance solution can be a huge challenge, with multiple stakeholders, numerous business processes, and extensive solution requirements. Use this requirements kit from the Compliance, Governance and Oversight Council (CGOC) to find the tools and technology you need.

Tags : ilg, data volumes, cgoc, information economics, it management, business intelligence, configuration management, service oriented architecture
    
By: CenturyLink Technology Solutions     Published Date: Feb 25, 2014

Read “Six Important Considerations When Choosing a Colocation Provider,” now, and make sure you are taking everything into consideration as you go down this path for your business.

Tags : centurylink, it applications, telecommunications, colocation, networking, infrastructure, network integration, internetworking hardware
    
By: Cisco Systems     Published Date: Jan 09, 2014

With applications lifting to the cloud and Internet edge shifting to the branch, the WAN connecting the branch to HQ needs more capacity than ever before. Join experts from Cisco and Akamai to learn how you can accelerate your transition to Internet as WAN—and make your branch smarter today. View Now

Tags : wan, iwan, cisco, cloud, branch office, branch management, internet, networking
    
By: Cisco Systems     Published Date: Dec 23, 2013

Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide

Tags : vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
    
By: GetWellNetwork, Inc.     Published Date: Nov 22, 2013

Learn how to improve the efficiency of your pain management workflow and see how these changes will improve the day to day tasks for your nurses allowing them to work more effectively.

Tags : getwell network, pain management, pain management workflow, joint commission, pain assessment documentation, pain management workflow, performance improvement, managing patient pain levels
    
By: IBM     Published Date: Nov 15, 2013

Analyst Wayne Kernochan of Infostructure Associates documents the analytics speed-up capability of DB2 with BLU Acceleration and explains how DB2 BLU compares with competitors. His conclusion after reviewing test results? Not surprisingly, the results verified a consistent, roughly order-of-magnitude speedup using BLU Acceleration, against DB2 pre-BLU and against some obvious competitors. What is his advice to readers about DB2 BLU? If your upcoming database needs analytics/BI/reporting-related, why would you not use BLU Acceleration for them? In other words, what are you waiting for?

Tags : ibm, analytics, db2, blu acceleration, acceleration, speed, database, business intelligence
    
By: NetApp     Published Date: Sep 19, 2013

Download this solutions guide to get a technical overview on building Hadoop on NetApp E-series storage and learn how it will effectively help deliver big analytics with pre-engineered, compatible, and supported solutions ultimately reducing the cost, schedule, and risk of do-it-yourself systems.

Tags : netapp, open solution, hadoop, solutions guide, e-series storage, big analytics, big data, application integration
    
By: Success Factors     Published Date: Jul 02, 2013

Technologies can streamline an existing process (often paper-based in small to medium-size businesses), making the process faster, reviews more effective, goals much clearer, and results easier to track. Leverage more efficient and effective performance and goal management processes in your small to medium-size business by following these FIVE steps.

Tags : successfactors, performance, goals, performance management, goal management, business intelligence, configuration management, database development
    
By: Oracle Corporation     Published Date: Apr 01, 2013

This paper focuses on configuring Oracle GoldenGate to run on Oracle Exadata. The Oracle Exadata Database Machine can act as the source database, as the target database, or in some cases as both source and target databases for GoldenGate processing.

Tags : database, goldengate, oracle, maximum availability architecture, arcitecture, high availability, configuration management, database development
    
By: Deltek - Nethawk     Published Date: Mar 05, 2013

This white paper provides a comprehensivelook at the TCO for both cloud and on-premise versions of specialized business solutions.

Tags : cloud, on premise, cloud computing it, tco, total cost of ownership, roi, cloud solution, network
    
By: Sponsored by HP and Intel ®     Published Date: Feb 21, 2013

Read this white paper to separate the technology and business potential from the marketing fluff. Get answers to your most pressing cloud questions and better understand when and where the cloud makes the most sense for your organization.

Tags : cloud, cloud computing, storage, networks, high availability, private cloud, public cloud, hybrid cloud
    
By: Oracle Corp.     Published Date: Feb 12, 2013

As the technologies and business practices surrounding Social, Mobile and BPM mature, IT and business stakeholders are discovering new ways to collaborate and engage customers via dynamic business processes that address several business imperatives.

Tags : customer experience, business process management, social, mobile, bpm, integration, application integration, best practices
    
By: McAfee     Published Date: Feb 06, 2013

Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.

Tags : big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
    
By: McAfee     Published Date: Feb 06, 2013

This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.

Tags : big data, big security data, mcafee siem, intrusion detection systems, security monitoring, anti spyware, anti virus, application security
    
By: CollabNet     Published Date: Jan 11, 2013

Read this whitepaper to learn about the 5 best practices for engineering performance management, and understand the do’s and don’ts of metrics management, analytics and reporting in software development environments.

Tags : performance management, it operations, productivity, measurement, application integration, application performance management, best practices, business activity monitoring
    
By: Dell     Published Date: Sep 24, 2012

Employ the newest DellT server technology, with high-density memory, balanced I/O and the latest processors, for your enterprise virtualization and business processing environments.

Tags : hardware, dell, high availability, virtualization, virtualized infrastructure, infrastructure, storage virtualization, configuration management
    
By: Dell     Published Date: Sep 24, 2012

Make IT the engine for your business success. The newest generation PowerEdgeT family is engineered with the right combination of features and performance scalability to handle tough workloads for both large and small data center environments.

Tags : it infrastructure, dell, server and storage configuration, data center, high availability, clustering, data, infrastructure configuration
    
By: ForeScout     Published Date: Aug 14, 2012

The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.

Tags : pad, mine, enabling, secure, personal, mobile, device, use
    
By: SunGard     Published Date: Aug 13, 2012

Unicous marketing improves reliability and flexibility, reduces costs, and increases performance with SunGard Enterprise Cloud Services.

Tags : unicous marketing, sungrad, cloud, services, improve performance, efficiency, enterprise applications, infrastructure
    
By: AMD     Published Date: Jul 23, 2012

How Microsoft Hyper-V and AMD Opteron Processors Enable True Business Agility.

Tags : virtualization, cloud computing, data mirgation, virtualized machines, virtual server performance, scalability, power management, system management
    
By: VMWare - vFabric     Published Date: May 10, 2012

View this webcast to learn about real-world examples of companies that have adopted VMware vFabric tc Server and how to plan for future cloud deployments.

Tags : vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware
    
By: VMWare - vFabric     Published Date: May 10, 2012

View this webcast to learn how to achieve real-time awareness by managing ever-increasing data volumes and transaction rates.

Tags : vfabric, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.