Objective ConfigurationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Objective Configuration returned the following results.
RSS What is RSS?
Related Categories

 •   Backup Systems and Services
 •   Disk-based Backup & Storage/ RAID
 •   Virtualization
 •   Disaster Recovery
 •   Change and Configuration Management
 •   Availability, Performance and Problem Management
 •   Storage Management
 •   Software Configuration Management (SCM)
 •   Data Security
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)

Related Searches
 •   Audits Objective Configuration
 •   Frameworks Objective Configuration
 •   Markets Objective Configuration
 •   Network Objective
 •   Objective Configuration Demand
 •   Objective Configuration Monitor
 •   Objective Download
 •   Objective Vermont
 •   Types Objective
Advertisement

ALL RESULTS
1 - 25 of 484 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Foglight - Application Management to Unify IT and the Business by Dell Software.
Your applications are the lifeblood of the service that IT delivers to end users and the business. Foglight, correlates application performance data and events from the entire more...
>> Discover more offerings from Dell Software.

Business Service Management by ASG Software Solutions

Business Service Management (BSM) solutions can effectively be defined as the fusion of IT and business needs, Successfully employed, they will empower IT with the necessary tools to increase overall business value. 
(SOFTWARE PRODUCT)

Virtual Chassis Performance: Juniper Networks EX Series Ethernet Switches by Juniper Networks, Inc.

December 06, 2010 - (Free Research)
Juniper Networks commissioned Network Test to assess the performance of Virtual Chassis technology on its EX Series Ethernet switches, especially in the areas of latency and high availability. The key objectives were to determine whether Virtual Chassis configurations would provide low latency and fast recovery from network failures. 
(CASE STUDY) READ ABSTRACT |

The Different Types of Air Conditioning Equipment for IT Environments by APC by Schneider Electric

July 09, 2009 - (Free Research)
Cooling equipment for an IT environment can be implemented in 10 basic configurations. The information in this paper allows IT professionals to be more involved in the specification of precision cooling solutions that better align with IT objectives. 
(WHITE PAPER) READ ABSTRACT |

The Changing Face of Network Management by CA Technologies.

April 2008 - (Free Research)
Automated network change and configuration management tools provide numerous benefits. Independent NCCM tools, however, are not enough on their own. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Configuration and Change Management for IT Compliance and Risk Management by Tripwire, Inc.

November 2007 - (Free Research)
This white paper discusses key issues surrounding configuration management and compliance, such as the IT department's need to lower costs, increase management flexibility and control, and increase responsiveness to business needs and requirements. 
(WHITE PAPER) READ ABSTRACT |

Strategic Data Center Transformation: Clouds, Tiers and Virtualization Converge for a Service Centric Model by GlassHouse Technologies (UK) Ltd.

March 2011 - (Free Research)
Data centres today are undergoing a dramatic shift in terms of the design objectives, technology options and configurations, and functional requirements. This GlassHouse white paper discusses a comprehensive strategy consisting of key interdependent elements that need to be thoughtfully planned. 
(WHITE PAPER) READ ABSTRACT |

ASG's metaCMDB™ Master or "Citizen" CMDB Containing Critical Enterprise Configuration Information by ASG Software Solutions

May 2010 - (Free Research)
The sound understanding and visibility of configuration information provided by ASG’s metaCMDB™ is critical for ITIL initiatives and business service management (BSM) implementations, service desk support, and the integration of disparate technologies. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Business Skill Courseware by SkillSoft Corporation

SkillSoft’s Business Skills Library focuses on behavioral skills that are designed for business professionals and key to performance regardless of job responsibility, as well as the skills and knowledge that are relevant to the various areas of functional responsibility in today’s business organizations. 
(ASP & SOFTWARE PRODUCT)

Defender 5 by Dell Software

Defender offers the essential security you need to conduct your e-business with confidence, safe in the knowledge that your critical digital assets, customers and employees are protected by reliable, future-proof software. 
(ASP & SOFTWARE PRODUCT)

The Business Context of Aligning IT with the Organization by IBM

April 2013 - (Free Research)
This whitepaper details how to get IT aligned with your business needs in the increasingly dynamic and globalized business world. 
(WHITE PAPER) READ ABSTRACT |

Top 5 Considerations While Setting up Your MySQL Backup by Zmanda Inc.

July 2008 - (Free Research)
A well thought through backup plan and configuration will go a long way to ensure that you can recover your database - when a system or user error deletes important data stored in MySQL - without impacting your business. 
(WHITE PAPER) READ ABSTRACT |

SAP on SUSE Linux Enterprise Simple Stack by SUSE

December 2011 - (Free Research)
Because organizations depend on SAP applications to plan for the future, points of failure can have serious, long-term implications. This white paper offers detailed guidance to help you build and maintain a highly available SAP architecture based on the successful integration of SUSE Linux and x86-64 hardware. 
(WHITE PAPER) READ ABSTRACT |

Quest MessageStats™ by Dell Software

Quest MessageStats empowers executive management, Information Technology (IT) managers, and Exchange administrators to perform business-critical analysis and reporting on Exchange e-mail infrastructures. 
(ASP & SOFTWARE PRODUCT)

Tools and Frameworks for Collaborative Development Communities in the Enterprise A New Model for Distributed Teams by CollabNet

October 2010 - (Free Research)
Collaboration has become an operational necessity for organizations. To succeed in today’s intensely competitive markets, an enterprise must enable collaboration among all members of its global development organization. This requires new tools and processes. Read this paper for insight into deploying an enterprise-class ALM platform. 
(WHITE PAPER) READ ABSTRACT |

ASG-Rochade the Leading Metadata Repository by ASG Software Solutions

ASG-Rochade is a metadata management solution for large and medium-sized organizations. It is a strategic, facilitating technology that manages information about data and systems across your enterprise. 
(SOFTWARE PRODUCT)

System Recovery-Breaking through the Dissimilar Hardware Restore Challenge by Symantec Corporation

March 2008 - (Free Research)
This paper discusses how Symantec Backup Exec System Recovery Restore Anyware can dramatically change the way organizations perform a wide range of IT tasks, including bare-metal system recovery and restoration to dissimilar hardware. 
(WHITE PAPER) READ ABSTRACT |

Integrated Service Management: Visibility. Control. Automation. by IBM

December 2010 - (Free Research)
With Integrated Service Management, organizations gain visibility, control and automation across organizational and infrastructure boundaries, making it possible to have an end-to-end view of a business service, effectively manage risk and compliance, and fundamentally change the economics of service delivery—all in support of business objectives. 
(BROCHURE) READ ABSTRACT |

Video: Introducing CA Nimsoft Monitor UMP 6.6 by CA Technologies.

July 2013 - (Free Research)
This interactive video showcases one of the newest, most promising additions to the monitoring marketplace and demonstrates its enhanced user interface, dashboard, alerting, and visibility features. Learn about other updates that make deployment, configuration, and decision-making easier than ever before. 
(VIDEO) READ ABSTRACT |

What Your CIO Should Know: Automated Policy Enforcement and Desired State for Enterprise PCs by Persystent Technologies

June 2008 - (Free Research)
Automating PC policy enforcement and desired state ensures that local and remote desktops and laptops remain compliant and maintain optimum availability which helps companies reduce PC support costs, and enhance user productivity and satisfaction. 
(WHITE PAPER) READ ABSTRACT |

Symantec Backup Exec™ System Recovery 8: The Gold Standard in Complete Windows System Recovery by Symantec Corporation

March 2008 - (Free Research)
Symantec Backup Exec™ System Recovery 8 is the gold standard in complete Windows® system recovery, allowing businesses and IT to recover from system loss or disaster in minutes, not hours or days. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

E-Book: Technical Guide on Application Security: Scanning Production Applications by IBM

December 2010 - (Free Research)
This e-book explores how many of the risks associated with scanning can be avoided with careful planning and by focusing your scans on exploring where and how a system is vulnerable to attack and not trying to simulate an actual attack. Continue reading to learn more about scanning production applications. 
(EBOOK) READ ABSTRACT |

Guide to Virtual Server Protection by Hewlett-Packard Limited

July 2011 - (Free Research)
HP Data Protector simplifies application protection through unified recovery and advanced automation and can help you meet any SLA for up to 70% less cost than competitive backup software solutions. 
(WHITE PAPER) READ ABSTRACT |

Seven Best Practices for Managing Software Intellectual Property in an Open Source World by Black Duck Software

October 2009 - (Free Research)
Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly. 
(WHITE PAPER) READ ABSTRACT |

Changing the Way Companies Run Their Data Centers by Aperture - An Emerson Network Brand

February 2010 - (Free Research)
Aperture VISTA revolutionizes data center management with a suite of solutions that delivers a comprehensive, integrated view of enterprise data centers. Aperture VISTA solutions enable organizations to deliver the highest levels of reliable, efficient IT service that truly aligns with business objectives. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 484 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts