Change and Configuration Management Reports

Computer Weekly – 14 March 2023: Digital dedication – the transformation of Guinness World Records
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out about the digital transformation at Guinness World Records – dedication, that's what you need. We examine the new space race – to launch low-orbit, low-cost communications satellites. And we look at the role of technology in sustainability strategies. Read the issue now.
Posted: 13 Mar 2023 | Published: 14 Mar 2023

TechTarget ComputerWeekly.com

The evolution of the agile organisation
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This research by PA Consulting finds that organisations can improve their financial performance as a result of adopting agile techniques.
Posted: 08 Feb 2021 | Published: 13 Nov 2018

TechTarget ComputerWeekly.com

Balancing Risk and Complexity with Quality Management
sponsored by IBM
WHITE PAPER: This white paper shows you how a combined IBM and Wind River quality management solution can help you deliver higher-quality products to the marketplace faster.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

IBM

CA Service Virtualization Overview
sponsored by CA Technologies
WEBCAST: This video gives an introduction to service virtualization and explores how it can give you access to all your application's dependent systems at any time during the build and test process. Watch to learn how you can accelerate the entire application development lifecycle by implementing service virtualization in your enterprise.
Posted: 17 May 2013 | Premiered: Apr 30, 2012

CA Technologies

eGuide: Strategies for building the best advanced case management architecture, Part I
sponsored by IBM
EGUIDE: Designing a case management architecture is more of an art—really, a balancing act—than a science. In this e-guide, readers will learn to address key considerations involved in designing an effective case management architecture that extends across the enterprise to enable better collaboration and decision-making.
Posted: 15 Nov 2011 | Published: 11 Nov 2011

IBM

Definitive Guide to Exchange Server 2010 Migration Chapter 5: Exchange 2010: Keeping up Appearances
sponsored by Mimecast
EGUIDE: Keeping Exchange Server 2010 running at full torque requires diligent management and administration. This e-guide examines some of the most common performance issues and explains how to mitigate them. Exchange MVP Andy Grogan also details best practices you should follow to prevent any performance setbacks.
Posted: 01 Feb 2012 | Published: 31 Jan 2012

Mimecast

The Seven Common Challenges of Administering Active Directory
sponsored by NetIQ Europe
WHITE PAPER: This white paper will out line the 7 common challenges you might face while trying to implement Active Directory securely. You will also learn some helpful tips that will assist you with these difficulties.
Posted: 18 May 2011 | Published: 18 May 2011

NetIQ Europe

Improve IT Visibility, Avoid Change Failures
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative white paper introduces an IT service management (ITSM) tool that automates the mapping of applications, infrastructure components, and their dependencies, resulting in a simplified approach to change and configuration management.
Posted: 02 Jun 2014 | Published: 31 Dec 2012

Hewlett Packard Enterprise

How to Implement Change Management Processes and Ensure a Successful ITSM Project
sponsored by OnX USA LLC
EGUIDE: All IT organizations face the constant and sometimes contradictory struggle to improve both the efficiency and quality of the IT services they provide. In this e-guide from SearchDataCenter.com, our experts share 10 considerations to keep in mind when implementing change management processes.
Posted: 27 May 2011 | Published: 27 May 2011

OnX USA LLC

E-Guide: Exploring Configuration Changes to Reduce Attacks
sponsored by Tripwire, Inc.
EGUIDE: Configuration changes help organizations with limited IT staff and resources not only mitigate against known threats, but also future attacks. This expert e-guide explains why firms continue to struggle with zero-day vulnerabilities and offers advice on how to lock down systems to eliminate threats posed by high-profile attacks.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

Tripwire, Inc.