Configurations ReviewWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Configurations Review returned the following results.
RSS What is RSS?
Related Categories

 •   Change and Configuration Management
 •   Enterprise Systems Management
 •   Data Center Management
 •   Networks
 •   Technology Planning and Analysis
 •   Software Configuration Management (SCM)
 •   Business Process Management (BPM)
 •   Virtualization
 •   Application Management and Maintenance
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Backup Configurations
 •   Configurations Conferences
 •   Configurations Customer
 •   Configurations On-Line
 •   Configurations Review Administration
 •   Configurations Review Monitor
 •   Configurations Review Operational
 •   Configurations Review White Papers
 •   Configurations Speed
 •   Support Configurations Review
Advertisement

ALL RESULTS
1 - 25 of 476 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Handle Configuration Changes Effectively by Hewlett-Packard Company

July 31, 2013 - (Free Research)
This white paper offers 2 methods to help you achieve policy-based change control in your configuration management system (CMS). 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Automating Virtual Machine Configuration by ePlus Technology

May 06, 2009 - (Free Research)
Learn the different methods for automating virtual machine configuration in this expert webcast transcript. Edward L. Haletky also reviews the different automation tools available for automating virtual machine installation and patch management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Network Barometer Report 2011 by Dimension Data

June 03, 2011 - (Free Research)
This report reviews the networks’ readiness to support business by evaluating the configuration variance from best practices, potential security vulnerabilities and end-of-life status of the included network devices. 
(ANALYST REPORT) READ ABSTRACT |

Moving to Sarbanes-Oxley Compliance in Three Days Using EventTracker by Prism Microsystems Inc.

June 2008 - (Free Research)
The purpose of this document is to explain how EventTracker can help your organization meet the audit reporting requirements of The Sarbanes-Oxley Act of 2002 (SOX). 
(WHITE PAPER) READ ABSTRACT |

Independent Lab Comparative Review by Avaya

June 2011 - (Free Research)
MierConsulting engineers conducted an hands-on, comparative review of three leading contact center packages, focusing on these products' multimedia, mixed voice and text-based contacts - capabilities. 
(PRODUCT REVIEW) READ ABSTRACT |

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations by Dell and Microsoft

April 2013 - (Free Research)
This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Management Associates Report-- The Power of AppScan: A Hands-On Review of IBM Rational AppScan Standard Edition by IBM

October 2010 - (Free Research)
In a hands-on look at IBM Rational AppScan Standard Edition, the Enterprise Management Associates® (EMA™) team finds in the product an easily implemented, highly configurable utility that addresses multiple application security pain points. 
(WHITE PAPER) READ ABSTRACT |

Virtualizing Microsoft® Exchange Server 2007 on Dell™ Systems Running Microsoft Windows Server® 2008 Hyper-V™ by Dell and Microsoft

April 2009 - (Free Research)
In this paper, various configurations of Exchange Server 2007 are tested in physical and virtual environments to evaluate the performance scalability and to understand the sizing requirements for Exchange Server 2007 in a virtualized environment. 
(WHITE PAPER) READ ABSTRACT |

Breaking the Business Intelligence Log Jam by ParAccel

May 2009 - (Free Research)
In an ongoing business intelligence project, the new required updates pile up at a steady or accelerating rate, while the effort to make each change grows as the system grows more complex. The inevitable result is a growing backlog of unmet business needs. That build-up is the BI Log Jam. Read this analyst report to learn how to break the cycle. 
(ANALYST REPORT) READ ABSTRACT |

Pocket E-Guide Review: Dell Latitude E6400 by Dell, Inc. and Intel®

December 2009 - (Free Research)
The Dell Latitude E6400 is a 14" laptop targeted towards businesses that need good performance, solid design, and a commonality of parts for an entire workforce. Read this Pocket E-Guide for a features and performance review of the Dell Latitude E6400. 
(EGUIDE) READ ABSTRACT |

Forecast: Cloudy! Efficient Software Delivery Leveraging Cloud by IBM

November 2011 - (Free Research)
This webcast looks at development and test workloads that lend themselves particularly well to leveraging the cloud, such as large scale load testing, and deployment planning and automation, and offers guidance and best practices for organizations interested in cloud-based solutions. 
(WEBCAST) READ ABSTRACT |

Tools for Team Development: Why Vendors are Finally Getting it Right by Microsoft

December 2008 - (Free Research)
This is an important moment in the evolution of development tools and they have more to offer than they did ten years ago. This analyst white paper reviews today's software development tools and how they are now able to help optimize the end-to-end development process. 
(WHITE PAPER) READ ABSTRACT |

Building a Home Lab for VMware vSphere 5.1 by Global Knowledge

June 2013 - (Free Research)
This white paper is not intended to be an in-depth review of how to install and configure vSphere 5.1, but rather an example scenario of a used and known implementation strategy that works. 
(WHITE PAPER) READ ABSTRACT |

Application Lifecycle Management and Business Process by Microsoft

December 2008 - (Free Research)
This analyst white paper clearly defines how application lifecycle management (ALM) supports business process and even floats the possibility ALM might be even more important, since it creates the underpinnings for all other business processes. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

August 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

TimeSummit by Exaktime

Time and attendance records collected in your JobClocks and/or PocketClocks are easily transferred into TimeSummit software, automatically assembled and presented to you in clear, concise reports. 
(SOFTWARE PRODUCT)

What is Application Lifecycle Management? by Microsoft

December 2008 - (Free Research)
This analyst white paper gives a clear definition to application lifecycle management (ALM). It also reviews 3 distinct main areas of ALM: governance, development and operations. 
(WHITE PAPER) READ ABSTRACT |

Benefits of IPControl Deployment by BT Diamond IP

February 2008 - (Free Research)
Implementation of IPControl led to an immediate € 40,000 reduction in network maintenance costs. 
(CASE STUDY) READ ABSTRACT |

Seven Practical Steps for Federal Cyber Security and FISMA Compliance by Tripwire, Inc.

April 2009 - (Free Research)
This paper provides seven practical steps any information security organization can take to improve information system security and achieve compliance with relevant regulations, standards and internal security and operational policy. 
(WHITE PAPER) READ ABSTRACT |

Web application firewalls: How they can help protect customers by Astaro

April 2012 - (Free Research)
In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews. 
(EGUIDE) READ ABSTRACT |

Implementing HA at the Enterprise Data Center Edge to Connect to a Large Number of Branch Offices by Juniper Networks, Inc.

December 2008 - (Free Research)
This paper explains how to deploy a highly available, working cluster by taking the design considerations and applying them to an actual deployment. 
(WHITE PAPER) READ ABSTRACT |

Breaking the Disk Barrier with In-Memory DBMS Technology: Sybase Adds a Big Performance Boost for ASE 15.5 by Sybase, an SAP company

June 2010 - (Free Research)
This paper discusses the growing need for high-performance database management, without disrupting applications and the operations of the datacenter. It discusses issues of performance versus durability and how an in-memory database strategy can be used to provide better high-speed, high-volume data management without sacrificing data integrity. 
(ANALYST REPORT) READ ABSTRACT |

Introducing the Agile Desktop: Achieve high velocity with the Klocwork C/C++ developer's desktop by Klocwork

November 2009 - (Free Research)
As Agile is embraced by development organizations everywhere, the need to produce clean, maintainable software quickly is great. To achieve development agility, developers must maintain velocity, eliminate bug debt, and focus on peer interaction. Read this paper to learn how to automate time consuming development activities to boost productivity. 
(WHITE PAPER) READ ABSTRACT |

The CIO’s Guide to Building a Mobile Device Management Strategy – And How to Execute on It by BlackBerry

September 2012 - (Free Research)
As the mobility trend continues to take over the business world, CIOs are left with the difficult task of figuring out the best way to manage the drastic increase in mobile users. Discover how mobile device management (MDM) strategies can enable you to improve mobile security, increase productivity, reduce TCO, and more. 
(WHITE PAPER) READ ABSTRACT |

Managing the hybrid cloud model by VMware, Inc.

November 2013 - (Free Research)
This expert e-guide will teach you the ways to manage your hybrid cloud environment. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 476 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts