Configuration OperationsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Configuration Operations returned the following results.
RSS What is RSS?
Related Categories

 •   Change and Configuration Management
 •   Virtualization
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Systems Management
 •   Data Center Management
 •   Application Management and Maintenance
 •   Business Process Management (BPM)
 •   Availability, Performance and Problem Management
 •   Network Management
 •   Storage Management

Related Searches
 •   Configuration Procedure
 •   Controls Configuration Operations
 •   Fast Configuration Operations
 •   Formats Configuration
 •   Learning About Configuration Operations
 •   Manager Configuration
 •   Matrix Configuration
 •   Statement Configuration Operations
 •   System Configuration Operations
 •   Version Configuration
Advertisement

ALL RESULTS
1 - 25 of 472 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Upgrading to 802.11n by SearchSecurity.com

January 18, 2012 - (Free Research)
This E-Guide identifies key questions that enterprise customers should ask prospective WLAN vendors and also provides a list of vendors that will suit the needs specific to your business. 
(EGUIDE) READ ABSTRACT |

What's Good for Security Is Good for Operations: Why Configuration Assessment Followed by Change Auditing Is Key to Operational Stability by Tripwire, Inc.

July 2008 - (Free Research)
Discover why configuration assessment followed by change auditing is key for operational stability, and that gaining visibility into all change to IT systems is the first step toward employing best practices across the organization. 
(WHITE PAPER) READ ABSTRACT |

Building a Highly-Available Enterprise Network with Juniper Networks EX Series Ethernet Switches by Juniper Networks, Inc.

February 2009 - (Free Research)
With the introduction of its EX Series Ethernet Switches, Juniper Networks is advancing the economics of networking, enabling customers to build the high-performance, highly available communication infrastructure they need for non-stop operations, while at the same time lowering capital and operational expenses. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Oracle Enterprise Manager 11g Configuration Management Pack by Oracle Corporation

April 2010 - (Free Research)
This white paper takes a three-pronged approach to configuration management: simplifying the management of your IT infrastructure; improving the level of service you provide your end users; and enforcing compliance with real-time change detection for files, database objects, users, and processes. 
(WHITE PAPER) READ ABSTRACT |

Automated Network Lifecycle Management-- Unifying Fault, Performance, and Configuration Management to Increase Uptime, Reduce Costs, and Minimize Human Error by Hewlett-Packard Company

December 2008 - (Free Research)
Learn about the benefits of state-of-the-art network fault management, performance management, and configuration management systems and the integration that brings them together. 
(WHITE PAPER) READ ABSTRACT |

Configuration Auditing – The Next Critical Step in Compliance by nCircle

August 2010 - (Free Research)
In this paper learn what Configuration auditing entails verifying the configurations of all assets in the environment to make sure they have the correct settings. This includes auditing new assets, monitoring for changes and verifying that planned changes are carried out properly. 
(WHITE PAPER) READ ABSTRACT |

Cisco 1800 Series Integrated Services Routers Fixed Configuration Models by Cisco Systems, Inc.

The Cisco® 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, scalable delivery of mission-critical business applications. 
(HARDWARE PRODUCT)

Transforming Operations Management Through Service Assurance with EMC by EMC Corporation

August 2012 - (Free Research)
This video describes the key capabilities of service assurance and how it can help your organization transform your operational management and ensure the availability and performance of your business applications and services. 
(WEBCAST) READ ABSTRACT |

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations by Dell and Microsoft

April 2013 - (Free Research)
This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management. 
(WHITE PAPER) READ ABSTRACT |

Deploying Microsoft® SQL Server™ 2005 Business Intelligence and Data Warehousing Solutions on Dell™ PowerEdge™ Servers and Dell™ PowerVault™ Storage by Dell, Inc.

September 2007 - (Free Research)
This white paper provides an architectural overview and configuration guidelines for deploying Microsoft SQL Server 2005 Business Intelligence and Data Warehouse technologies on Dell PowerEdge servers with Dell PowerVault storage. 
(WHITE PAPER) READ ABSTRACT |

S3 Control: Adding Control to Change Management by Solidcore Systems, Inc.

There is a gap between change activity & the documented Change Management process. Solidcore S3 Control adds control to change management. It provides visibility into changes in the enterprise IT infrastructure, accountability for employees deploying ticketed changes, & enforcement of change policies. It is available on IBM platforms. 
(SOFTWARE PRODUCT)

Comparing UPS System Design Configurations by APC by Schneider Electric

January 2005 - (Free Research)
An Uninterruptible Power Supply (UPS) is often the best way to avoid downtime, but choosing a system can be a challenge. This white paper explains the five most common UPS configurations and the benefits and limitations of each. 
(WHITE PAPER) READ ABSTRACT |

eBook: Reduce Network Operations Centers (NOC) Costs with Automation -- HP eBook by Hewlett-Packard Company

February 2009 - (Free Research)
Check out this eBook to learn how to unify fault, performance and configuration management to increase uptime, reduce costs, and reduce human error. 
(EBOOK) READ ABSTRACT |

Managing Change Effectively with ERP: The Impact On 5 Key Business Functions by Infor

December 2009 - (Free Research)
This white paper examines the impact of using disparate systems versus an integrated ERP system on your manufacturing operations. The detailed charts on the following pages provide insight into how the inefficiencies associated with change management today can be easily and cost-effectively eliminated. 
(WHITE PAPER) READ ABSTRACT |

Liebert Monitoring by Liebert Corporation

The Albér Cellcorder CRT-300 cell resistance tester displays and records cell float voltage, internal cell resistance and intercell connection resistance. The portable unit includes a memory card, backlit graphical reflective LCD.... 
(HARDWARE PRODUCT)

Lowering the Cost of Test with Integrated Switch Management by National Instruments

February 2002 - (Free Research)
National Instruments Switch Executive is a significant innovation in the design and implementation of automated test systems. 
(WHITE PAPER)

ISCSI SAN Boot - Simplifying Server Operations On SANS by Dell, Inc.

March 2009 - (Free Research)
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. This paper explains the benefits of three different server boot operations provided by one advanced SAN configuration. It counsels that you should weigh the benefits and drawbacks of each before committing your organization's storage system to one. 
(WHITE PAPER) READ ABSTRACT |

The management cockpit approach to running your IT environment by Hewlett-Packard Company

November 2013 - (Free Research)
As IT environments become more dynamic, your operations teams need a unified approach to management and monitoring. In this webcast, learn how automatic detection and automated monitoring setup and configuration are two methods for meeting IT challenges. Inside, discover how the "management cockpit" improves management, and much more. 
(WEBCAST) READ ABSTRACT |

How ASG's MetaCMDB Strategy Enables More Effective BSM by ASG Software Solutions

February 2010 - (Free Research)
This white paper looks at two of the most fundamental and conflicted concepts surrounding these requirements: BSM and the CMDB system, focusing on CMDB requirements as they support a BSM strategy, and highlighting ASG's offerings in that context. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

ISCSI SAN BOOT - Simplifying Server Operations on SANS by Dell, Inc.

July 2008 - (Free Research)
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. 
(WHITE PAPER) READ ABSTRACT |

EMC Virtual Infrastructure Data Protection by EMC Corporation

EMC Virtual Infrastructure Data Protection solutions guard your virtual infrastructure applications and data from downtime and provide the availability you expect for critical workloads. It combins backup and recovery technologies with VMware server virtualization. 
(SOFTWARE PRODUCT)

ALM and Agile Strategies Issue 2 by CA Technologies.

April 2012 - (Free Research)
Application lifecycle management (ALM) is what keeps the latest software tools working, and Agile ALM provides transparency and improved communications between teams and stakeholders. This exclusive e-zine discusses the latest collaboration tools for ALM and software configuration management (SCM). 
(EZINE) READ ABSTRACT |

SecurStor 2500 RAID by Excel Meridian Data, Inc.

SecurStor 2500 RAID is designed as a high-performance and high-availability solution, with multiple configuration options providing available No Single Point of Failure redundancy for up-to 64 TB of multi-host cluster-capable storage. 
(HARDWARE PRODUCT)

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

1 - 25 of 472 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts